Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-28458 (GCVE-0-2020-28458)
Vulnerability from cvelistv5
- Prototype Pollution
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | datatables.net |
Version: 0 < unspecified |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T16:40:58.714Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402"
},
{
"tags": [
"x_transferred"
],
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1051961"
},
{
"tags": [
"x_transferred"
],
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1051962"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/DataTables/Dist-DataTables/blob/master/js/jquery.dataTables.js%23L2766"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/DataTables/DataTablesSrc/commit/a51cbe99fd3d02aa5582f97d4af1615d11a1ea03"
},
{
"tags": [
"x_transferred"
],
"url": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20240621-0006/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "datatables.net",
"vendor": "n/a",
"versions": [
{
"lessThan": "unspecified",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Alessio Della Libera (d3lla)"
}
],
"datePublic": "2020-12-16T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Prototype Pollution",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-06-21T19:07:12.415586",
"orgId": "bae035ff-b466-4ff4-94d0-fc9efd9e1730",
"shortName": "snyk"
},
"references": [
{
"url": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402"
},
{
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1051961"
},
{
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1051962"
},
{
"url": "https://github.com/DataTables/Dist-DataTables/blob/master/js/jquery.dataTables.js%23L2766"
},
{
"url": "https://github.com/DataTables/DataTablesSrc/commit/a51cbe99fd3d02aa5582f97d4af1615d11a1ea03"
},
{
"url": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240621-0006/"
}
],
"title": "Prototype Pollution"
}
},
"cveMetadata": {
"assignerOrgId": "bae035ff-b466-4ff4-94d0-fc9efd9e1730",
"assignerShortName": "snyk",
"cveId": "CVE-2020-28458",
"datePublished": "2020-12-16T10:35:20.456264Z",
"dateReserved": "2020-11-12T00:00:00",
"dateUpdated": "2024-09-16T23:22:14.200Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2020-28458\",\"sourceIdentifier\":\"report@snyk.io\",\"published\":\"2020-12-16T11:15:12.130\",\"lastModified\":\"2024-11-21T05:22:50.460\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806.\"},{\"lang\":\"es\",\"value\":\"Todas las versiones del paquete datatables.net son vulnerables a una contaminaci\u00f3n de prototipos debido a una correcci\u00f3n incompleta para https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"report@snyk.io\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L\",\"baseScore\":7.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":3.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L\",\"baseScore\":7.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":3.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1321\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:datatables:datatables.net:*:*:*:*:*:node.js:*:*\",\"versionEndExcluding\":\"1.10.23\",\"matchCriteriaId\":\"E9C31498-D6FB-4A18-86D6-10D48577C6EF\"}]}]}],\"references\":[{\"url\":\"https://github.com/DataTables/DataTablesSrc/commit/a51cbe99fd3d02aa5582f97d4af1615d11a1ea03\",\"source\":\"report@snyk.io\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/DataTables/Dist-DataTables/blob/master/js/jquery.dataTables.js%23L2766\",\"source\":\"report@snyk.io\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240621-0006/\",\"source\":\"report@snyk.io\"},{\"url\":\"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1051961\",\"source\":\"report@snyk.io\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1051962\",\"source\":\"report@snyk.io\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402\",\"source\":\"report@snyk.io\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806\",\"source\":\"report@snyk.io\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/DataTables/DataTablesSrc/commit/a51cbe99fd3d02aa5582f97d4af1615d11a1ea03\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/DataTables/Dist-DataTables/blob/master/js/jquery.dataTables.js%23L2766\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240621-0006/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1051961\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1051962\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]}]}}"
}
}
fkie_cve-2020-28458
Vulnerability from fkie_nvd
7.3 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
| URL | Tags | ||
|---|---|---|---|
| report@snyk.io | https://github.com/DataTables/DataTablesSrc/commit/a51cbe99fd3d02aa5582f97d4af1615d11a1ea03 | Patch, Third Party Advisory | |
| report@snyk.io | https://github.com/DataTables/Dist-DataTables/blob/master/js/jquery.dataTables.js%23L2766 | Broken Link, Third Party Advisory | |
| report@snyk.io | https://security.netapp.com/advisory/ntap-20240621-0006/ | ||
| report@snyk.io | https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1051961 | Third Party Advisory | |
| report@snyk.io | https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1051962 | Third Party Advisory | |
| report@snyk.io | https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402 | Third Party Advisory | |
| report@snyk.io | https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806 | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/DataTables/DataTablesSrc/commit/a51cbe99fd3d02aa5582f97d4af1615d11a1ea03 | Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/DataTables/Dist-DataTables/blob/master/js/jquery.dataTables.js%23L2766 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20240621-0006/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1051961 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1051962 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806 | Exploit, Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| datatables | datatables.net | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:datatables:datatables.net:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "E9C31498-D6FB-4A18-86D6-10D48577C6EF",
"versionEndExcluding": "1.10.23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806."
},
{
"lang": "es",
"value": "Todas las versiones del paquete datatables.net son vulnerables a una contaminaci\u00f3n de prototipos debido a una correcci\u00f3n incompleta para https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806"
}
],
"id": "CVE-2020-28458",
"lastModified": "2024-11-21T05:22:50.460",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4,
"source": "report@snyk.io",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-12-16T11:15:12.130",
"references": [
{
"source": "report@snyk.io",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/DataTables/DataTablesSrc/commit/a51cbe99fd3d02aa5582f97d4af1615d11a1ea03"
},
{
"source": "report@snyk.io",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "https://github.com/DataTables/Dist-DataTables/blob/master/js/jquery.dataTables.js%23L2766"
},
{
"source": "report@snyk.io",
"url": "https://security.netapp.com/advisory/ntap-20240621-0006/"
},
{
"source": "report@snyk.io",
"tags": [
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1051961"
},
{
"source": "report@snyk.io",
"tags": [
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1051962"
},
{
"source": "report@snyk.io",
"tags": [
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402"
},
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/DataTables/DataTablesSrc/commit/a51cbe99fd3d02aa5582f97d4af1615d11a1ea03"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "https://github.com/DataTables/Dist-DataTables/blob/master/js/jquery.dataTables.js%23L2766"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.netapp.com/advisory/ntap-20240621-0006/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1051961"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1051962"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806"
}
],
"sourceIdentifier": "report@snyk.io",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-1321"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
rhsa-2021_1186
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for org.ovirt.engine-root, ovirt-engine-ui-extensions, and ovirt-web-ui is now available for Red Hat Virtualization Engine 4.4.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The ovirt-engine package provides the manager for virtualization environments.\nThis manager enables admins to define hosts and networks, as well as to add\nstorage, create VMs and manage user permissions.\n\nBug Fix(es):\n* Previously, saving user preferences in the Red Hat Virtualization Manager required the MANIPULATE_USERS permission level. As a result, user preferences were not saved on the server.\nIn this release, the required permission level for saving user preferences was changed to EDIT_PROFILE, which is the permission level assigned by default to all users. As a result, saving user preferences works as expected. (BZ#1920539)\n\nA list of bugs fixed in this update is available in the Technical Notes\nbook:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes\n\nSecurity Fix(es):\n\n* nodejs-bootstrap-select: not escaping title values on \u003coption\u003e may lead to XSS (CVE-2019-20921)\n\n* datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name (CVE-2020-28458)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:1186",
"url": "https://access.redhat.com/errata/RHSA-2021:1186"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes",
"url": "https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes"
},
{
"category": "external",
"summary": "1171924",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171924"
},
{
"category": "external",
"summary": "1750426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1750426"
},
{
"category": "external",
"summary": "1795457",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1795457"
},
{
"category": "external",
"summary": "1882273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882273"
},
{
"category": "external",
"summary": "1908441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908441"
},
{
"category": "external",
"summary": "1920539",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920539"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1186.json"
}
],
"title": "Red Hat Security Advisory: RHV Manager (ovirt-engine) 4.4.z [ovirt-4.4.5] 0-day security, bug fix, enhance",
"tracking": {
"current_release_date": "2024-11-26T06:33:00+00:00",
"generator": {
"date": "2024-11-26T06:33:00+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:1186",
"initial_release_date": "2021-04-14T16:34:35+00:00",
"revision_history": [
{
"date": "2021-04-14T16:34:35+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-04-14T16:34:35+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-26T06:33:00+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product": {
"name": "RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhev_manager:4.4:el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src",
"product": {
"name": "ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src",
"product_id": "ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-ui-extensions@1.2.5-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "ovirt-web-ui-0:1.6.8-1.el8ev.src",
"product": {
"name": "ovirt-web-ui-0:1.6.8-1.el8ev.src",
"product_id": "ovirt-web-ui-0:1.6.8-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-web-ui@1.6.8-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-0:4.4.5.11-0.1.el8ev.src",
"product": {
"name": "ovirt-engine-0:4.4.5.11-0.1.el8ev.src",
"product_id": "ovirt-engine-0:4.4.5.11-0.1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine@4.4.5.11-0.1.el8ev?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch",
"product": {
"name": "ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch",
"product_id": "ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-ui-extensions@1.2.5-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-web-ui-0:1.6.8-1.el8ev.noarch",
"product": {
"name": "ovirt-web-ui-0:1.6.8-1.el8ev.noarch",
"product_id": "ovirt-web-ui-0:1.6.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-web-ui@1.6.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-backend@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-dbscripts@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-health-check-bundler@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-restapi@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-base@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-cinderlib@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-imageio@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-ovirt-engine@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-ovirt-engine-common@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-vmconsole-proxy-helper@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-websocket-proxy@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-tools@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-tools-backup@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-vmconsole-proxy-helper@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-webadmin-portal@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-websocket-proxy@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ovirt-engine-lib@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhvm-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "rhvm-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "rhvm-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhvm@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-0:4.4.5.11-0.1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.src"
},
"product_reference": "ovirt-engine-0:4.4.5.11-0.1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch"
},
"product_reference": "ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src"
},
"product_reference": "ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-web-ui-0:1.6.8-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.noarch"
},
"product_reference": "ovirt-web-ui-0:1.6.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-web-ui-0:1.6.8-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.src"
},
"product_reference": "ovirt-web-ui-0:1.6.8-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhvm-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:rhvm-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "rhvm-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-20921",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2020-09-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.11-0.1.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1882273"
}
],
"notes": [
{
"category": "description",
"text": "bootstrap-select before 1.13.6 allows Cross-Site Scripting (XSS). It does not escape title values in OPTION elements. This may allow attackers to execute arbitrary JavaScript in a victim\u0027s browser.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-bootstrap-select: not escaping title values on \u003coption\u003e may lead to XSS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In OpenShift Service Mesh (OSSM) the openshift-service-mesh/kiali-rhel7 container (which installs the kiali rpm) is behind OpenShift OAuth authentication restricting access to the vulnerable bootstrap-select library to authenticated users only, therefore the impact is low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src"
],
"known_not_affected": [
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.11-0.1.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-20921"
},
{
"category": "external",
"summary": "RHBZ#1882273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882273"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20921"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20921",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20921"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-9r7h-6639-v5mw",
"url": "https://github.com/advisories/GHSA-9r7h-6639-v5mw"
},
{
"category": "external",
"summary": "https://snyk.io/vuln/SNYK-JS-BOOTSTRAPSELECT-570457",
"url": "https://snyk.io/vuln/SNYK-JS-BOOTSTRAPSELECT-570457"
}
],
"release_date": "2019-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T16:34:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1186"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-bootstrap-select: not escaping title values on \u003coption\u003e may lead to XSS"
},
{
"cve": "CVE-2020-28458",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2020-12-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.11-0.1.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1908441"
}
],
"notes": [
{
"category": "description",
"text": "All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift console container does package a vulnerable version of datatables.net, however as access to the vulnerable component is restricted via OpenShift OAuth the vulnerability is rated with an impact of `Low`.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src"
],
"known_not_affected": [
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.11-0.1.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28458"
},
{
"category": "external",
"summary": "RHBZ#1908441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908441"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28458",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28458"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28458",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28458"
},
{
"category": "external",
"summary": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402",
"url": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402"
}
],
"release_date": "2020-10-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T16:34:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1186"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name"
}
]
}
RHSA-2021:1184
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated host packages that fix several bugs and add various enhancements are now available.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The ovirt-hosted-engine-setup package provides a self-hosted engine tool for the Red Hat Virtualization Manager. A self-hosted engine is a virtualized environment in which the Manager runs on a virtual machine on the hosts managed by the Manager.\nBug Fix(es):\n\n* In this release, it is now possible to enter a path to the OVA archive for local appliance installation using the cockpit-ovirt UI. (BZ#1755156)\n\n* Previously, following a successful migration on the Self-hosted Engine, he HA agent on the source host immediately moved to the state EngineDown, and shorly thereafter tried to start the engine locally, if the destination host didn\u0027t update the shared storage quickly enough, marking the Manager virtual machine as being up.\nAs a result, starting the virtual machine failed due to a shared lock held by the destination host. This also resulted in generating false alarms and notifications.\nIn this release, the HA agent first moves to the state EngineMaybeAway, providing the destination host more time to update the shared storage with the updated state. As a result, no notifications or false alarms are generated. \nNote: in scenarios where the virtual machine needs to be started on the source host, this fix slightly increases the time it takes the Manager virtual\nmachine on the source host to start. (BZ#1815589)\n\n* Previously, if a host in the Self-hosted Engine had an ID number higher than 64, other hosts did not recognize that host, and the host did not appear in \u0027hosted-engine --vm-status\u0027.\nIn this release, the Self-hosted Engine allows host ID numbers of up to 2000. (BZ#1916032)\n\n* ovirt-hosted-engine-setup now requires ansible-2.9.17. (BZ#1921108)\n\n* Previously the logical names for disks without a mounted filesystem were not displayed in the Red Hat Virtualization Manager. \nIn this release, logical names for such disks are properly reported provided the version of QEMU Guest Agent in the virtual machine is 5.2 or higher. (BZ#1836661)\n\n* Previously, if the Seal option was used when creating a template for Linux virtual machines, the original host name was not removed from the template. \nIn this release, the host name is set to localhost or the new virtual machine host name. (BZ#1860492)\n\n* Previously, the used memory of the host didn\u0027t take the SReclaimable memory into consideration while it did for free memory. As a result, there were discrepancies in the host statistics. \nIn this release, the SReclaimable memory is a part of the used memory calculation. (BZ#1916519)\n\nSecurity Fix(es):\n\n* datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name (CVE-2020-28458)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:1184",
"url": "https://access.redhat.com/errata/RHSA-2021:1184"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1755156",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755156"
},
{
"category": "external",
"summary": "1796415",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796415"
},
{
"category": "external",
"summary": "1815589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815589"
},
{
"category": "external",
"summary": "1836661",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1836661"
},
{
"category": "external",
"summary": "1860492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860492"
},
{
"category": "external",
"summary": "1870435",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1870435"
},
{
"category": "external",
"summary": "1901503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901503"
},
{
"category": "external",
"summary": "1908441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908441"
},
{
"category": "external",
"summary": "1909956",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1909956"
},
{
"category": "external",
"summary": "1916032",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1916032"
},
{
"category": "external",
"summary": "1916519",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1916519"
},
{
"category": "external",
"summary": "1916947",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1916947"
},
{
"category": "external",
"summary": "1917927",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917927"
},
{
"category": "external",
"summary": "1919246",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919246"
},
{
"category": "external",
"summary": "1921014",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921014"
},
{
"category": "external",
"summary": "1921108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921108"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1184.json"
}
],
"title": "Red Hat Security Advisory: RHV RHEL Host (ovirt-host) 4.4.z [ovirt-4.4.5] security, bug fix, enhancement",
"tracking": {
"current_release_date": "2025-10-09T20:47:19+00:00",
"generator": {
"date": "2025-10-09T20:47:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:1184",
"initial_release_date": "2021-04-14T11:41:44+00:00",
"revision_history": [
{
"date": "2021-04-14T11:41:44+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-04-14T11:41:44+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:47:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product": {
"name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "v2v-conversion-host-0:1.16.2-10.el8ev.src",
"product": {
"name": "v2v-conversion-host-0:1.16.2-10.el8ev.src",
"product_id": "v2v-conversion-host-0:1.16.2-10.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/v2v-conversion-host@1.16.2-10.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "ovirt-host-0:4.4.5-1.el8ev.src",
"product": {
"name": "ovirt-host-0:4.4.5-1.el8ev.src",
"product_id": "ovirt-host-0:4.4.5-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-host@4.4.5-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.src",
"product": {
"name": "ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.src",
"product_id": "ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-hosted-engine-setup@2.4.9-4.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.src",
"product": {
"name": "ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.src",
"product_id": "ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-hosted-engine-ha@2.4.6-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "cockpit-ovirt-0:0.14.20-1.el8ev.src",
"product": {
"name": "cockpit-ovirt-0:0.14.20-1.el8ev.src",
"product_id": "cockpit-ovirt-0:0.14.20-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cockpit-ovirt@0.14.20-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "vdsm-0:4.40.50.8-1.el8ev.src",
"product": {
"name": "vdsm-0:4.40.50.8-1.el8ev.src",
"product_id": "vdsm-0:4.40.50.8-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm@4.40.50.8-1.el8ev?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch",
"product": {
"name": "v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch",
"product_id": "v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/v2v-conversion-host-wrapper@1.16.2-10.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch",
"product": {
"name": "v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch",
"product_id": "v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/v2v-conversion-host-ansible@1.16.2-10.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.noarch",
"product": {
"name": "ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.noarch",
"product_id": "ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-hosted-engine-setup@2.4.9-4.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.noarch",
"product": {
"name": "ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.noarch",
"product_id": "ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-hosted-engine-ha@2.4.6-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "cockpit-ovirt-dashboard-0:0.14.20-1.el8ev.noarch",
"product": {
"name": "cockpit-ovirt-dashboard-0:0.14.20-1.el8ev.noarch",
"product_id": "cockpit-ovirt-dashboard-0:0.14.20-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cockpit-ovirt-dashboard@0.14.20-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-api-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-api-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-api-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-api@4.40.50.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-client-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-client-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-client-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-client@4.40.50.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-common-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-common-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-common-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-common@4.40.50.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-cpuflags@4.40.50.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-ethtool-options@4.40.50.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-fcoe@4.40.50.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-localdisk@4.40.50.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-nestedvt@4.40.50.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-openstacknet@4.40.50.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-vhostmd@4.40.50.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-vmfex-dev@4.40.50.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-http-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-http-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-http-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-http@4.40.50.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-jsonrpc@4.40.50.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-python-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-python-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-python-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-python@4.40.50.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-yajsonrpc@4.40.50.8-1.el8ev?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "ovirt-host-0:4.4.5-1.el8ev.x86_64",
"product": {
"name": "ovirt-host-0:4.4.5-1.el8ev.x86_64",
"product_id": "ovirt-host-0:4.4.5-1.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-host@4.4.5-1.el8ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovirt-host-dependencies-0:4.4.5-1.el8ev.x86_64",
"product": {
"name": "ovirt-host-dependencies-0:4.4.5-1.el8ev.x86_64",
"product_id": "ovirt-host-dependencies-0:4.4.5-1.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-host-dependencies@4.4.5-1.el8ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vdsm-0:4.40.50.8-1.el8ev.x86_64",
"product": {
"name": "vdsm-0:4.40.50.8-1.el8ev.x86_64",
"product_id": "vdsm-0:4.40.50.8-1.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm@4.40.50.8-1.el8ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64",
"product": {
"name": "vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64",
"product_id": "vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-gluster@4.40.50.8-1.el8ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64",
"product": {
"name": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64",
"product_id": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-checkips@4.40.50.8-1.el8ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64",
"product": {
"name": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64",
"product_id": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-extra-ipv4-addrs@4.40.50.8-1.el8ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vdsm-network-0:4.40.50.8-1.el8ev.x86_64",
"product": {
"name": "vdsm-network-0:4.40.50.8-1.el8ev.x86_64",
"product_id": "vdsm-network-0:4.40.50.8-1.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-network@4.40.50.8-1.el8ev?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovirt-host-0:4.4.5-1.el8ev.ppc64le",
"product": {
"name": "ovirt-host-0:4.4.5-1.el8ev.ppc64le",
"product_id": "ovirt-host-0:4.4.5-1.el8ev.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-host@4.4.5-1.el8ev?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovirt-host-dependencies-0:4.4.5-1.el8ev.ppc64le",
"product": {
"name": "ovirt-host-dependencies-0:4.4.5-1.el8ev.ppc64le",
"product_id": "ovirt-host-dependencies-0:4.4.5-1.el8ev.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-host-dependencies@4.4.5-1.el8ev?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "vdsm-0:4.40.50.8-1.el8ev.ppc64le",
"product": {
"name": "vdsm-0:4.40.50.8-1.el8ev.ppc64le",
"product_id": "vdsm-0:4.40.50.8-1.el8ev.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm@4.40.50.8-1.el8ev?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le",
"product": {
"name": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le",
"product_id": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-checkips@4.40.50.8-1.el8ev?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le",
"product": {
"name": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le",
"product_id": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-extra-ipv4-addrs@4.40.50.8-1.el8ev?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "vdsm-network-0:4.40.50.8-1.el8ev.ppc64le",
"product": {
"name": "vdsm-network-0:4.40.50.8-1.el8ev.ppc64le",
"product_id": "vdsm-network-0:4.40.50.8-1.el8ev.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-network@4.40.50.8-1.el8ev?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cockpit-ovirt-0:0.14.20-1.el8ev.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:cockpit-ovirt-0:0.14.20-1.el8ev.src"
},
"product_reference": "cockpit-ovirt-0:0.14.20-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cockpit-ovirt-dashboard-0:0.14.20-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.14.20-1.el8ev.noarch"
},
"product_reference": "cockpit-ovirt-dashboard-0:0.14.20-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-host-0:4.4.5-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:ovirt-host-0:4.4.5-1.el8ev.ppc64le"
},
"product_reference": "ovirt-host-0:4.4.5-1.el8ev.ppc64le",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-host-0:4.4.5-1.el8ev.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:ovirt-host-0:4.4.5-1.el8ev.src"
},
"product_reference": "ovirt-host-0:4.4.5-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-host-0:4.4.5-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:ovirt-host-0:4.4.5-1.el8ev.x86_64"
},
"product_reference": "ovirt-host-0:4.4.5-1.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-host-dependencies-0:4.4.5-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:ovirt-host-dependencies-0:4.4.5-1.el8ev.ppc64le"
},
"product_reference": "ovirt-host-dependencies-0:4.4.5-1.el8ev.ppc64le",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-host-dependencies-0:4.4.5-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:ovirt-host-dependencies-0:4.4.5-1.el8ev.x86_64"
},
"product_reference": "ovirt-host-dependencies-0:4.4.5-1.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.noarch"
},
"product_reference": "ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.src"
},
"product_reference": "ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.noarch"
},
"product_reference": "ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.src"
},
"product_reference": "ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.src",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "v2v-conversion-host-0:1.16.2-10.el8ev.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:v2v-conversion-host-0:1.16.2-10.el8ev.src"
},
"product_reference": "v2v-conversion-host-0:1.16.2-10.el8ev.src",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch"
},
"product_reference": "v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch"
},
"product_reference": "v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-0:4.40.50.8-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-0:4.40.50.8-1.el8ev.ppc64le"
},
"product_reference": "vdsm-0:4.40.50.8-1.el8ev.ppc64le",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-0:4.40.50.8-1.el8ev.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-0:4.40.50.8-1.el8ev.src"
},
"product_reference": "vdsm-0:4.40.50.8-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-0:4.40.50.8-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-0:4.40.50.8-1.el8ev.x86_64"
},
"product_reference": "vdsm-0:4.40.50.8-1.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-api-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-api-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-api-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-client-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-client-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-client-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-common-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-common-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-common-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64"
},
"product_reference": "vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le"
},
"product_reference": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64"
},
"product_reference": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le"
},
"product_reference": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64"
},
"product_reference": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-http-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-http-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-http-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-network-0:4.40.50.8-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-network-0:4.40.50.8-1.el8ev.ppc64le"
},
"product_reference": "vdsm-network-0:4.40.50.8-1.el8ev.ppc64le",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-network-0:4.40.50.8-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-network-0:4.40.50.8-1.el8ev.x86_64"
},
"product_reference": "vdsm-network-0:4.40.50.8-1.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-python-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-python-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-python-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "v2v-conversion-host-0:1.16.2-10.el8ev.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:v2v-conversion-host-0:1.16.2-10.el8ev.src"
},
"product_reference": "v2v-conversion-host-0:1.16.2-10.el8ev.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch"
},
"product_reference": "v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch"
},
"product_reference": "v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-0:4.40.50.8-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-0:4.40.50.8-1.el8ev.ppc64le"
},
"product_reference": "vdsm-0:4.40.50.8-1.el8ev.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-0:4.40.50.8-1.el8ev.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-0:4.40.50.8-1.el8ev.src"
},
"product_reference": "vdsm-0:4.40.50.8-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-0:4.40.50.8-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-0:4.40.50.8-1.el8ev.x86_64"
},
"product_reference": "vdsm-0:4.40.50.8-1.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-api-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-api-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-api-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-client-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-client-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-client-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-common-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-common-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-common-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64"
},
"product_reference": "vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le"
},
"product_reference": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64"
},
"product_reference": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le"
},
"product_reference": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64"
},
"product_reference": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-http-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-http-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-http-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-network-0:4.40.50.8-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-network-0:4.40.50.8-1.el8ev.ppc64le"
},
"product_reference": "vdsm-network-0:4.40.50.8-1.el8ev.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-network-0:4.40.50.8-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-network-0:4.40.50.8-1.el8ev.x86_64"
},
"product_reference": "vdsm-network-0:4.40.50.8-1.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-python-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-python-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-python-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-28458",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2020-12-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Agents-4:ovirt-host-0:4.4.5-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:ovirt-host-0:4.4.5-1.el8ev.src",
"8Base-RHV-Agents-4:ovirt-host-0:4.4.5-1.el8ev.x86_64",
"8Base-RHV-Agents-4:ovirt-host-dependencies-0:4.4.5-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:ovirt-host-dependencies-0:4.4.5-1.el8ev.x86_64",
"8Base-RHV-Agents-4:ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.noarch",
"8Base-RHV-Agents-4:ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.src",
"8Base-RHV-Agents-4:ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.noarch",
"8Base-RHV-Agents-4:ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.src",
"8Base-RHV-Agents-4:v2v-conversion-host-0:1.16.2-10.el8ev.src",
"8Base-RHV-Agents-4:v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch",
"8Base-RHV-Agents-4:v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:vdsm-0:4.40.50.8-1.el8ev.src",
"8Base-RHV-Agents-4:vdsm-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Agents-4:vdsm-api-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-client-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-common-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Agents-4:vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Agents-4:vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-http-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-network-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:vdsm-network-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Agents-4:vdsm-python-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:v2v-conversion-host-0:1.16.2-10.el8ev.src",
"8Base-RHV-Hypervisor-4:v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch",
"8Base-RHV-Hypervisor-4:v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Hypervisor-4:vdsm-0:4.40.50.8-1.el8ev.src",
"8Base-RHV-Hypervisor-4:vdsm-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Hypervisor-4:vdsm-api-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-client-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-common-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Hypervisor-4:vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Hypervisor-4:vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-http-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-network-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Hypervisor-4:vdsm-network-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Hypervisor-4:vdsm-python-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1908441"
}
],
"notes": [
{
"category": "description",
"text": "All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift console container does package a vulnerable version of datatables.net, however as access to the vulnerable component is restricted via OpenShift OAuth the vulnerability is rated with an impact of `Low`.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Agents-4:cockpit-ovirt-0:0.14.20-1.el8ev.src",
"8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.14.20-1.el8ev.noarch"
],
"known_not_affected": [
"8Base-RHV-Agents-4:ovirt-host-0:4.4.5-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:ovirt-host-0:4.4.5-1.el8ev.src",
"8Base-RHV-Agents-4:ovirt-host-0:4.4.5-1.el8ev.x86_64",
"8Base-RHV-Agents-4:ovirt-host-dependencies-0:4.4.5-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:ovirt-host-dependencies-0:4.4.5-1.el8ev.x86_64",
"8Base-RHV-Agents-4:ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.noarch",
"8Base-RHV-Agents-4:ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.src",
"8Base-RHV-Agents-4:ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.noarch",
"8Base-RHV-Agents-4:ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.src",
"8Base-RHV-Agents-4:v2v-conversion-host-0:1.16.2-10.el8ev.src",
"8Base-RHV-Agents-4:v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch",
"8Base-RHV-Agents-4:v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:vdsm-0:4.40.50.8-1.el8ev.src",
"8Base-RHV-Agents-4:vdsm-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Agents-4:vdsm-api-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-client-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-common-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Agents-4:vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Agents-4:vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-http-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-network-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:vdsm-network-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Agents-4:vdsm-python-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:v2v-conversion-host-0:1.16.2-10.el8ev.src",
"8Base-RHV-Hypervisor-4:v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch",
"8Base-RHV-Hypervisor-4:v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Hypervisor-4:vdsm-0:4.40.50.8-1.el8ev.src",
"8Base-RHV-Hypervisor-4:vdsm-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Hypervisor-4:vdsm-api-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-client-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-common-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Hypervisor-4:vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Hypervisor-4:vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-http-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-network-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Hypervisor-4:vdsm-network-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Hypervisor-4:vdsm-python-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28458"
},
{
"category": "external",
"summary": "RHBZ#1908441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908441"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28458",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28458"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28458",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28458"
},
{
"category": "external",
"summary": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402",
"url": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402"
}
],
"release_date": "2020-10-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T11:41:44+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Agents-4:cockpit-ovirt-0:0.14.20-1.el8ev.src",
"8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.14.20-1.el8ev.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1184"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RHV-Agents-4:cockpit-ovirt-0:0.14.20-1.el8ev.src",
"8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.14.20-1.el8ev.noarch",
"8Base-RHV-Agents-4:ovirt-host-0:4.4.5-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:ovirt-host-0:4.4.5-1.el8ev.src",
"8Base-RHV-Agents-4:ovirt-host-0:4.4.5-1.el8ev.x86_64",
"8Base-RHV-Agents-4:ovirt-host-dependencies-0:4.4.5-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:ovirt-host-dependencies-0:4.4.5-1.el8ev.x86_64",
"8Base-RHV-Agents-4:ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.noarch",
"8Base-RHV-Agents-4:ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.src",
"8Base-RHV-Agents-4:ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.noarch",
"8Base-RHV-Agents-4:ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.src",
"8Base-RHV-Agents-4:v2v-conversion-host-0:1.16.2-10.el8ev.src",
"8Base-RHV-Agents-4:v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch",
"8Base-RHV-Agents-4:v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:vdsm-0:4.40.50.8-1.el8ev.src",
"8Base-RHV-Agents-4:vdsm-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Agents-4:vdsm-api-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-client-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-common-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Agents-4:vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Agents-4:vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-http-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-network-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:vdsm-network-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Agents-4:vdsm-python-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:v2v-conversion-host-0:1.16.2-10.el8ev.src",
"8Base-RHV-Hypervisor-4:v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch",
"8Base-RHV-Hypervisor-4:v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Hypervisor-4:vdsm-0:4.40.50.8-1.el8ev.src",
"8Base-RHV-Hypervisor-4:vdsm-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Hypervisor-4:vdsm-api-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-client-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-common-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Hypervisor-4:vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Hypervisor-4:vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-http-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-network-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Hypervisor-4:vdsm-network-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Hypervisor-4:vdsm-python-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name"
}
]
}
rhsa-2021_1184
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated host packages that fix several bugs and add various enhancements are now available.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The ovirt-hosted-engine-setup package provides a self-hosted engine tool for the Red Hat Virtualization Manager. A self-hosted engine is a virtualized environment in which the Manager runs on a virtual machine on the hosts managed by the Manager.\nBug Fix(es):\n\n* In this release, it is now possible to enter a path to the OVA archive for local appliance installation using the cockpit-ovirt UI. (BZ#1755156)\n\n* Previously, following a successful migration on the Self-hosted Engine, he HA agent on the source host immediately moved to the state EngineDown, and shorly thereafter tried to start the engine locally, if the destination host didn\u0027t update the shared storage quickly enough, marking the Manager virtual machine as being up.\nAs a result, starting the virtual machine failed due to a shared lock held by the destination host. This also resulted in generating false alarms and notifications.\nIn this release, the HA agent first moves to the state EngineMaybeAway, providing the destination host more time to update the shared storage with the updated state. As a result, no notifications or false alarms are generated. \nNote: in scenarios where the virtual machine needs to be started on the source host, this fix slightly increases the time it takes the Manager virtual\nmachine on the source host to start. (BZ#1815589)\n\n* Previously, if a host in the Self-hosted Engine had an ID number higher than 64, other hosts did not recognize that host, and the host did not appear in \u0027hosted-engine --vm-status\u0027.\nIn this release, the Self-hosted Engine allows host ID numbers of up to 2000. (BZ#1916032)\n\n* ovirt-hosted-engine-setup now requires ansible-2.9.17. (BZ#1921108)\n\n* Previously the logical names for disks without a mounted filesystem were not displayed in the Red Hat Virtualization Manager. \nIn this release, logical names for such disks are properly reported provided the version of QEMU Guest Agent in the virtual machine is 5.2 or higher. (BZ#1836661)\n\n* Previously, if the Seal option was used when creating a template for Linux virtual machines, the original host name was not removed from the template. \nIn this release, the host name is set to localhost or the new virtual machine host name. (BZ#1860492)\n\n* Previously, the used memory of the host didn\u0027t take the SReclaimable memory into consideration while it did for free memory. As a result, there were discrepancies in the host statistics. \nIn this release, the SReclaimable memory is a part of the used memory calculation. (BZ#1916519)\n\nSecurity Fix(es):\n\n* datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name (CVE-2020-28458)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:1184",
"url": "https://access.redhat.com/errata/RHSA-2021:1184"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1755156",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755156"
},
{
"category": "external",
"summary": "1796415",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796415"
},
{
"category": "external",
"summary": "1815589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815589"
},
{
"category": "external",
"summary": "1836661",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1836661"
},
{
"category": "external",
"summary": "1860492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860492"
},
{
"category": "external",
"summary": "1870435",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1870435"
},
{
"category": "external",
"summary": "1901503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901503"
},
{
"category": "external",
"summary": "1908441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908441"
},
{
"category": "external",
"summary": "1909956",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1909956"
},
{
"category": "external",
"summary": "1916032",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1916032"
},
{
"category": "external",
"summary": "1916519",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1916519"
},
{
"category": "external",
"summary": "1916947",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1916947"
},
{
"category": "external",
"summary": "1917927",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917927"
},
{
"category": "external",
"summary": "1919246",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919246"
},
{
"category": "external",
"summary": "1921014",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921014"
},
{
"category": "external",
"summary": "1921108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921108"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1184.json"
}
],
"title": "Red Hat Security Advisory: RHV RHEL Host (ovirt-host) 4.4.z [ovirt-4.4.5] security, bug fix, enhancement",
"tracking": {
"current_release_date": "2024-11-22T16:21:06+00:00",
"generator": {
"date": "2024-11-22T16:21:06+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:1184",
"initial_release_date": "2021-04-14T11:41:44+00:00",
"revision_history": [
{
"date": "2021-04-14T11:41:44+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-04-14T11:41:44+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T16:21:06+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product": {
"name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "v2v-conversion-host-0:1.16.2-10.el8ev.src",
"product": {
"name": "v2v-conversion-host-0:1.16.2-10.el8ev.src",
"product_id": "v2v-conversion-host-0:1.16.2-10.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/v2v-conversion-host@1.16.2-10.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "ovirt-host-0:4.4.5-1.el8ev.src",
"product": {
"name": "ovirt-host-0:4.4.5-1.el8ev.src",
"product_id": "ovirt-host-0:4.4.5-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-host@4.4.5-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.src",
"product": {
"name": "ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.src",
"product_id": "ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-hosted-engine-setup@2.4.9-4.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.src",
"product": {
"name": "ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.src",
"product_id": "ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-hosted-engine-ha@2.4.6-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "cockpit-ovirt-0:0.14.20-1.el8ev.src",
"product": {
"name": "cockpit-ovirt-0:0.14.20-1.el8ev.src",
"product_id": "cockpit-ovirt-0:0.14.20-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cockpit-ovirt@0.14.20-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "vdsm-0:4.40.50.8-1.el8ev.src",
"product": {
"name": "vdsm-0:4.40.50.8-1.el8ev.src",
"product_id": "vdsm-0:4.40.50.8-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm@4.40.50.8-1.el8ev?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch",
"product": {
"name": "v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch",
"product_id": "v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/v2v-conversion-host-wrapper@1.16.2-10.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch",
"product": {
"name": "v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch",
"product_id": "v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/v2v-conversion-host-ansible@1.16.2-10.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.noarch",
"product": {
"name": "ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.noarch",
"product_id": "ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-hosted-engine-setup@2.4.9-4.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.noarch",
"product": {
"name": "ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.noarch",
"product_id": "ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-hosted-engine-ha@2.4.6-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "cockpit-ovirt-dashboard-0:0.14.20-1.el8ev.noarch",
"product": {
"name": "cockpit-ovirt-dashboard-0:0.14.20-1.el8ev.noarch",
"product_id": "cockpit-ovirt-dashboard-0:0.14.20-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cockpit-ovirt-dashboard@0.14.20-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-api-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-api-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-api-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-api@4.40.50.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-client-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-client-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-client-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-client@4.40.50.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-common-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-common-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-common-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-common@4.40.50.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-cpuflags@4.40.50.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-ethtool-options@4.40.50.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-fcoe@4.40.50.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-localdisk@4.40.50.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-nestedvt@4.40.50.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-openstacknet@4.40.50.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-vhostmd@4.40.50.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-vmfex-dev@4.40.50.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-http-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-http-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-http-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-http@4.40.50.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-jsonrpc@4.40.50.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-python-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-python-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-python-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-python@4.40.50.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-yajsonrpc@4.40.50.8-1.el8ev?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "ovirt-host-0:4.4.5-1.el8ev.x86_64",
"product": {
"name": "ovirt-host-0:4.4.5-1.el8ev.x86_64",
"product_id": "ovirt-host-0:4.4.5-1.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-host@4.4.5-1.el8ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovirt-host-dependencies-0:4.4.5-1.el8ev.x86_64",
"product": {
"name": "ovirt-host-dependencies-0:4.4.5-1.el8ev.x86_64",
"product_id": "ovirt-host-dependencies-0:4.4.5-1.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-host-dependencies@4.4.5-1.el8ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vdsm-0:4.40.50.8-1.el8ev.x86_64",
"product": {
"name": "vdsm-0:4.40.50.8-1.el8ev.x86_64",
"product_id": "vdsm-0:4.40.50.8-1.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm@4.40.50.8-1.el8ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64",
"product": {
"name": "vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64",
"product_id": "vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-gluster@4.40.50.8-1.el8ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64",
"product": {
"name": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64",
"product_id": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-checkips@4.40.50.8-1.el8ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64",
"product": {
"name": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64",
"product_id": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-extra-ipv4-addrs@4.40.50.8-1.el8ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vdsm-network-0:4.40.50.8-1.el8ev.x86_64",
"product": {
"name": "vdsm-network-0:4.40.50.8-1.el8ev.x86_64",
"product_id": "vdsm-network-0:4.40.50.8-1.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-network@4.40.50.8-1.el8ev?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovirt-host-0:4.4.5-1.el8ev.ppc64le",
"product": {
"name": "ovirt-host-0:4.4.5-1.el8ev.ppc64le",
"product_id": "ovirt-host-0:4.4.5-1.el8ev.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-host@4.4.5-1.el8ev?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovirt-host-dependencies-0:4.4.5-1.el8ev.ppc64le",
"product": {
"name": "ovirt-host-dependencies-0:4.4.5-1.el8ev.ppc64le",
"product_id": "ovirt-host-dependencies-0:4.4.5-1.el8ev.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-host-dependencies@4.4.5-1.el8ev?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "vdsm-0:4.40.50.8-1.el8ev.ppc64le",
"product": {
"name": "vdsm-0:4.40.50.8-1.el8ev.ppc64le",
"product_id": "vdsm-0:4.40.50.8-1.el8ev.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm@4.40.50.8-1.el8ev?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le",
"product": {
"name": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le",
"product_id": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-checkips@4.40.50.8-1.el8ev?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le",
"product": {
"name": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le",
"product_id": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-extra-ipv4-addrs@4.40.50.8-1.el8ev?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "vdsm-network-0:4.40.50.8-1.el8ev.ppc64le",
"product": {
"name": "vdsm-network-0:4.40.50.8-1.el8ev.ppc64le",
"product_id": "vdsm-network-0:4.40.50.8-1.el8ev.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-network@4.40.50.8-1.el8ev?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cockpit-ovirt-0:0.14.20-1.el8ev.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:cockpit-ovirt-0:0.14.20-1.el8ev.src"
},
"product_reference": "cockpit-ovirt-0:0.14.20-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cockpit-ovirt-dashboard-0:0.14.20-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.14.20-1.el8ev.noarch"
},
"product_reference": "cockpit-ovirt-dashboard-0:0.14.20-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-host-0:4.4.5-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:ovirt-host-0:4.4.5-1.el8ev.ppc64le"
},
"product_reference": "ovirt-host-0:4.4.5-1.el8ev.ppc64le",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-host-0:4.4.5-1.el8ev.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:ovirt-host-0:4.4.5-1.el8ev.src"
},
"product_reference": "ovirt-host-0:4.4.5-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-host-0:4.4.5-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:ovirt-host-0:4.4.5-1.el8ev.x86_64"
},
"product_reference": "ovirt-host-0:4.4.5-1.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-host-dependencies-0:4.4.5-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:ovirt-host-dependencies-0:4.4.5-1.el8ev.ppc64le"
},
"product_reference": "ovirt-host-dependencies-0:4.4.5-1.el8ev.ppc64le",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-host-dependencies-0:4.4.5-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:ovirt-host-dependencies-0:4.4.5-1.el8ev.x86_64"
},
"product_reference": "ovirt-host-dependencies-0:4.4.5-1.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.noarch"
},
"product_reference": "ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.src"
},
"product_reference": "ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.noarch"
},
"product_reference": "ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.src"
},
"product_reference": "ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.src",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "v2v-conversion-host-0:1.16.2-10.el8ev.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:v2v-conversion-host-0:1.16.2-10.el8ev.src"
},
"product_reference": "v2v-conversion-host-0:1.16.2-10.el8ev.src",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch"
},
"product_reference": "v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch"
},
"product_reference": "v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-0:4.40.50.8-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-0:4.40.50.8-1.el8ev.ppc64le"
},
"product_reference": "vdsm-0:4.40.50.8-1.el8ev.ppc64le",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-0:4.40.50.8-1.el8ev.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-0:4.40.50.8-1.el8ev.src"
},
"product_reference": "vdsm-0:4.40.50.8-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-0:4.40.50.8-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-0:4.40.50.8-1.el8ev.x86_64"
},
"product_reference": "vdsm-0:4.40.50.8-1.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-api-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-api-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-api-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-client-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-client-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-client-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-common-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-common-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-common-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64"
},
"product_reference": "vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le"
},
"product_reference": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64"
},
"product_reference": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le"
},
"product_reference": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64"
},
"product_reference": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-http-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-http-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-http-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-network-0:4.40.50.8-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-network-0:4.40.50.8-1.el8ev.ppc64le"
},
"product_reference": "vdsm-network-0:4.40.50.8-1.el8ev.ppc64le",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-network-0:4.40.50.8-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-network-0:4.40.50.8-1.el8ev.x86_64"
},
"product_reference": "vdsm-network-0:4.40.50.8-1.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-python-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-python-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-python-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "v2v-conversion-host-0:1.16.2-10.el8ev.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:v2v-conversion-host-0:1.16.2-10.el8ev.src"
},
"product_reference": "v2v-conversion-host-0:1.16.2-10.el8ev.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch"
},
"product_reference": "v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch"
},
"product_reference": "v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-0:4.40.50.8-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-0:4.40.50.8-1.el8ev.ppc64le"
},
"product_reference": "vdsm-0:4.40.50.8-1.el8ev.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-0:4.40.50.8-1.el8ev.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-0:4.40.50.8-1.el8ev.src"
},
"product_reference": "vdsm-0:4.40.50.8-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-0:4.40.50.8-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-0:4.40.50.8-1.el8ev.x86_64"
},
"product_reference": "vdsm-0:4.40.50.8-1.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-api-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-api-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-api-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-client-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-client-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-client-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-common-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-common-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-common-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64"
},
"product_reference": "vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le"
},
"product_reference": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64"
},
"product_reference": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le"
},
"product_reference": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64"
},
"product_reference": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-http-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-http-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-http-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-network-0:4.40.50.8-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-network-0:4.40.50.8-1.el8ev.ppc64le"
},
"product_reference": "vdsm-network-0:4.40.50.8-1.el8ev.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-network-0:4.40.50.8-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-network-0:4.40.50.8-1.el8ev.x86_64"
},
"product_reference": "vdsm-network-0:4.40.50.8-1.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-python-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-python-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-python-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-28458",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2020-12-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Agents-4:ovirt-host-0:4.4.5-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:ovirt-host-0:4.4.5-1.el8ev.src",
"8Base-RHV-Agents-4:ovirt-host-0:4.4.5-1.el8ev.x86_64",
"8Base-RHV-Agents-4:ovirt-host-dependencies-0:4.4.5-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:ovirt-host-dependencies-0:4.4.5-1.el8ev.x86_64",
"8Base-RHV-Agents-4:ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.noarch",
"8Base-RHV-Agents-4:ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.src",
"8Base-RHV-Agents-4:ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.noarch",
"8Base-RHV-Agents-4:ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.src",
"8Base-RHV-Agents-4:v2v-conversion-host-0:1.16.2-10.el8ev.src",
"8Base-RHV-Agents-4:v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch",
"8Base-RHV-Agents-4:v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:vdsm-0:4.40.50.8-1.el8ev.src",
"8Base-RHV-Agents-4:vdsm-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Agents-4:vdsm-api-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-client-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-common-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Agents-4:vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Agents-4:vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-http-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-network-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:vdsm-network-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Agents-4:vdsm-python-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:v2v-conversion-host-0:1.16.2-10.el8ev.src",
"8Base-RHV-Hypervisor-4:v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch",
"8Base-RHV-Hypervisor-4:v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Hypervisor-4:vdsm-0:4.40.50.8-1.el8ev.src",
"8Base-RHV-Hypervisor-4:vdsm-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Hypervisor-4:vdsm-api-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-client-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-common-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Hypervisor-4:vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Hypervisor-4:vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-http-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-network-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Hypervisor-4:vdsm-network-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Hypervisor-4:vdsm-python-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1908441"
}
],
"notes": [
{
"category": "description",
"text": "All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift console container does package a vulnerable version of datatables.net, however as access to the vulnerable component is restricted via OpenShift OAuth the vulnerability is rated with an impact of `Low`.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Agents-4:cockpit-ovirt-0:0.14.20-1.el8ev.src",
"8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.14.20-1.el8ev.noarch"
],
"known_not_affected": [
"8Base-RHV-Agents-4:ovirt-host-0:4.4.5-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:ovirt-host-0:4.4.5-1.el8ev.src",
"8Base-RHV-Agents-4:ovirt-host-0:4.4.5-1.el8ev.x86_64",
"8Base-RHV-Agents-4:ovirt-host-dependencies-0:4.4.5-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:ovirt-host-dependencies-0:4.4.5-1.el8ev.x86_64",
"8Base-RHV-Agents-4:ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.noarch",
"8Base-RHV-Agents-4:ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.src",
"8Base-RHV-Agents-4:ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.noarch",
"8Base-RHV-Agents-4:ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.src",
"8Base-RHV-Agents-4:v2v-conversion-host-0:1.16.2-10.el8ev.src",
"8Base-RHV-Agents-4:v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch",
"8Base-RHV-Agents-4:v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:vdsm-0:4.40.50.8-1.el8ev.src",
"8Base-RHV-Agents-4:vdsm-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Agents-4:vdsm-api-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-client-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-common-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Agents-4:vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Agents-4:vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-http-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-network-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:vdsm-network-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Agents-4:vdsm-python-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:v2v-conversion-host-0:1.16.2-10.el8ev.src",
"8Base-RHV-Hypervisor-4:v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch",
"8Base-RHV-Hypervisor-4:v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Hypervisor-4:vdsm-0:4.40.50.8-1.el8ev.src",
"8Base-RHV-Hypervisor-4:vdsm-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Hypervisor-4:vdsm-api-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-client-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-common-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Hypervisor-4:vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Hypervisor-4:vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-http-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-network-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Hypervisor-4:vdsm-network-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Hypervisor-4:vdsm-python-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28458"
},
{
"category": "external",
"summary": "RHBZ#1908441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908441"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28458",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28458"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28458",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28458"
},
{
"category": "external",
"summary": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402",
"url": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402"
}
],
"release_date": "2020-10-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T11:41:44+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Agents-4:cockpit-ovirt-0:0.14.20-1.el8ev.src",
"8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.14.20-1.el8ev.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1184"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RHV-Agents-4:cockpit-ovirt-0:0.14.20-1.el8ev.src",
"8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.14.20-1.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name"
}
]
}
rhsa-2021_1169
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Virtualization Engine 4.4.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The ovirt-engine package provides the manager for virtualization environments.\nThis manager enables admins to define hosts and networks, as well as to add\nstorage, create VMs and manage user permissions.\n\nA list of bugs fixed in this update is available in the Technical Notes\nbook:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes\n\nSecurity Fix(es):\n\n* nodejs-bootstrap-select: not escaping title values on \u003coption\u003e may lead to XSS (CVE-2019-20921)\n\n* m2crypto: bleichenbacher timing attacks in the RSA decryption API (CVE-2020-25657)\n\n* datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name (CVE-2020-28458)\n\n* nodejs-immer: prototype pollution may lead to DoS or remote code execution (CVE-2020-28477)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:1169",
"url": "https://access.redhat.com/errata/RHSA-2021:1169"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes",
"url": "https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes"
},
{
"category": "external",
"summary": "1145658",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1145658"
},
{
"category": "external",
"summary": "1155275",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1155275"
},
{
"category": "external",
"summary": "1649479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1649479"
},
{
"category": "external",
"summary": "1666786",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666786"
},
{
"category": "external",
"summary": "1688186",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1688186"
},
{
"category": "external",
"summary": "1729359",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1729359"
},
{
"category": "external",
"summary": "1787235",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1787235"
},
{
"category": "external",
"summary": "1802844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802844"
},
{
"category": "external",
"summary": "1837221",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1837221"
},
{
"category": "external",
"summary": "1843882",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1843882"
},
{
"category": "external",
"summary": "1858420",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1858420"
},
{
"category": "external",
"summary": "1882273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882273"
},
{
"category": "external",
"summary": "1884233",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1884233"
},
{
"category": "external",
"summary": "1889823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889823"
},
{
"category": "external",
"summary": "1895217",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895217"
},
{
"category": "external",
"summary": "1901503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901503"
},
{
"category": "external",
"summary": "1901752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901752"
},
{
"category": "external",
"summary": "1905108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905108"
},
{
"category": "external",
"summary": "1905158",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905158"
},
{
"category": "external",
"summary": "1908441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908441"
},
{
"category": "external",
"summary": "1910302",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1910302"
},
{
"category": "external",
"summary": "1913198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913198"
},
{
"category": "external",
"summary": "1914602",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1914602"
},
{
"category": "external",
"summary": "1918162",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918162"
},
{
"category": "external",
"summary": "1919555",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919555"
},
{
"category": "external",
"summary": "1921104",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921104"
},
{
"category": "external",
"summary": "1921119",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921119"
},
{
"category": "external",
"summary": "1922200",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922200"
},
{
"category": "external",
"summary": "1924012",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1924012"
},
{
"category": "external",
"summary": "1926854",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1926854"
},
{
"category": "external",
"summary": "1927851",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927851"
},
{
"category": "external",
"summary": "1931514",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1931514"
},
{
"category": "external",
"summary": "1931786",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1931786"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1169.json"
}
],
"title": "Red Hat Security Advisory: RHV Manager (ovirt-engine) 4.4.z [ovirt-4.4.5] security, bug fix, enhancement",
"tracking": {
"current_release_date": "2024-11-26T06:32:59+00:00",
"generator": {
"date": "2024-11-26T06:32:59+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:1169",
"initial_release_date": "2021-04-14T16:34:39+00:00",
"revision_history": [
{
"date": "2021-04-14T16:34:39+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-04-14T16:34:39+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-26T06:32:59+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product": {
"name": "RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhev_manager:4.4:el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-sshd-0:2.6.0-1.el8ev.src",
"product": {
"name": "apache-sshd-0:2.6.0-1.el8ev.src",
"product_id": "apache-sshd-0:2.6.0-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-sshd@2.6.0-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-runner-service-0:1.0.7-1.el8ev.src",
"product": {
"name": "ansible-runner-service-0:1.0.7-1.el8ev.src",
"product_id": "ansible-runner-service-0:1.0.7-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-runner-service@1.0.7-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-runner-0:1.4.6-2.el8ar.src",
"product": {
"name": "ansible-runner-0:1.4.6-2.el8ar.src",
"product_id": "ansible-runner-0:1.4.6-2.el8ar.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-runner@1.4.6-2.el8ar?arch=src"
}
}
},
{
"category": "product_version",
"name": "ovirt-web-ui-0:1.6.7-1.el8ev.src",
"product": {
"name": "ovirt-web-ui-0:1.6.7-1.el8ev.src",
"product_id": "ovirt-web-ui-0:1.6.7-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-web-ui@1.6.7-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"product": {
"name": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"product_id": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-dwh@4.4.5.5-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"product": {
"name": "ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"product_id": "ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine@4.4.5.9-0.1.el8ev?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-sshd-0:2.6.0-1.el8ev.noarch",
"product": {
"name": "apache-sshd-0:2.6.0-1.el8ev.noarch",
"product_id": "apache-sshd-0:2.6.0-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-sshd@2.6.0-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"product": {
"name": "apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"product_id": "apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-sshd-javadoc@2.6.0-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"product": {
"name": "ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"product_id": "ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-runner-service@1.0.7-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-runner-0:1.4.6-2.el8ar.noarch",
"product": {
"name": "ansible-runner-0:1.4.6-2.el8ar.noarch",
"product_id": "ansible-runner-0:1.4.6-2.el8ar.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-runner@1.4.6-2.el8ar?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"product": {
"name": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"product_id": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ansible-runner@1.4.6-2.el8ar?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"product": {
"name": "ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"product_id": "ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-web-ui@1.6.7-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"product": {
"name": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"product_id": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-dwh@4.4.5.5-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"product": {
"name": "ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"product_id": "ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-dwh-grafana-integration-setup@4.4.5.5-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"product": {
"name": "ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"product_id": "ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-dwh-setup@4.4.5.5-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-backend@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-dbscripts@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-health-check-bundler@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-restapi@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-base@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-cinderlib@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-imageio@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-ovirt-engine@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-ovirt-engine-common@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-vmconsole-proxy-helper@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-websocket-proxy@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-tools@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-tools-backup@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-vmconsole-proxy-helper@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-webadmin-portal@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-websocket-proxy@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ovirt-engine-lib@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhvm-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "rhvm-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "rhvm-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhvm@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-runner-0:1.4.6-2.el8ar.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch"
},
"product_reference": "ansible-runner-0:1.4.6-2.el8ar.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-runner-0:1.4.6-2.el8ar.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src"
},
"product_reference": "ansible-runner-0:1.4.6-2.el8ar.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-runner-service-0:1.0.7-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch"
},
"product_reference": "ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-runner-service-0:1.0.7-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src"
},
"product_reference": "ansible-runner-service-0:1.0.7-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-sshd-0:2.6.0-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch"
},
"product_reference": "apache-sshd-0:2.6.0-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-sshd-0:2.6.0-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src"
},
"product_reference": "apache-sshd-0:2.6.0-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch"
},
"product_reference": "apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-0:4.4.5.9-0.1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src"
},
"product_reference": "ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch"
},
"product_reference": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src"
},
"product_reference": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch"
},
"product_reference": "ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch"
},
"product_reference": "ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-web-ui-0:1.6.7-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch"
},
"product_reference": "ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-web-ui-0:1.6.7-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
},
"product_reference": "ovirt-web-ui-0:1.6.7-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch"
},
"product_reference": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhvm-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "rhvm-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-20921",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2020-09-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1882273"
}
],
"notes": [
{
"category": "description",
"text": "bootstrap-select before 1.13.6 allows Cross-Site Scripting (XSS). It does not escape title values in OPTION elements. This may allow attackers to execute arbitrary JavaScript in a victim\u0027s browser.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-bootstrap-select: not escaping title values on \u003coption\u003e may lead to XSS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In OpenShift Service Mesh (OSSM) the openshift-service-mesh/kiali-rhel7 container (which installs the kiali rpm) is behind OpenShift OAuth authentication restricting access to the vulnerable bootstrap-select library to authenticated users only, therefore the impact is low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
],
"known_not_affected": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-20921"
},
{
"category": "external",
"summary": "RHBZ#1882273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882273"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20921"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20921",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20921"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-9r7h-6639-v5mw",
"url": "https://github.com/advisories/GHSA-9r7h-6639-v5mw"
},
{
"category": "external",
"summary": "https://snyk.io/vuln/SNYK-JS-BOOTSTRAPSELECT-570457",
"url": "https://snyk.io/vuln/SNYK-JS-BOOTSTRAPSELECT-570457"
}
],
"release_date": "2019-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T16:34:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1169"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-bootstrap-select: not escaping title values on \u003coption\u003e may lead to XSS"
},
{
"cve": "CVE-2020-25657",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2020-10-19T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1889823"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in all released versions of m2crypto, where they are vulnerable to Bleichenbacher timing attacks in the RSA decryption API via the timed processing of valid PKCS#1 v1.5 Ciphertext. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "m2crypto: bleichenbacher timing attacks in the RSA decryption API",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
],
"known_not_affected": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-25657"
},
{
"category": "external",
"summary": "RHBZ#1889823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889823"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-25657",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25657"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25657",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25657"
}
],
"release_date": "2020-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T16:34:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1169"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "m2crypto: bleichenbacher timing attacks in the RSA decryption API"
},
{
"cve": "CVE-2020-28458",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2020-12-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1908441"
}
],
"notes": [
{
"category": "description",
"text": "All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift console container does package a vulnerable version of datatables.net, however as access to the vulnerable component is restricted via OpenShift OAuth the vulnerability is rated with an impact of `Low`.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
],
"known_not_affected": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28458"
},
{
"category": "external",
"summary": "RHBZ#1908441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908441"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28458",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28458"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28458",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28458"
},
{
"category": "external",
"summary": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402",
"url": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402"
}
],
"release_date": "2020-10-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T16:34:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1169"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name"
},
{
"cve": "CVE-2020-28477",
"cwe": {
"id": "CWE-915",
"name": "Improperly Controlled Modification of Dynamically-Determined Object Attributes"
},
"discovery_date": "2021-01-20T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1918162"
}
],
"notes": [
{
"category": "description",
"text": "This affects all versions of package immer.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-immer: prototype pollution may lead to DoS or remote code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Virtualization includes affected version of nodejs-immer, however the usage does not meet the conditions required to exploit the flaw, therefore the impact is Low.\n\nIn OpenShift Container Platform 4.6 (OCP) the openshift4/ose-prometheus container ships the vulnerable version of the nodejs-immer, however the Prometheus react-ui is disabled, hence this flaw cannot be exploited. As openshift4/ose-prometheus container still packages the vulnerable code, this component is affected with impact Low. This may be fixed in a future release.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
],
"known_not_affected": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28477"
},
{
"category": "external",
"summary": "RHBZ#1918162",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918162"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28477",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28477"
},
{
"category": "external",
"summary": "https://snyk.io/vuln/SNYK-JS-IMMER-1019369",
"url": "https://snyk.io/vuln/SNYK-JS-IMMER-1019369"
}
],
"release_date": "2021-01-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T16:34:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1169"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "nodejs-immer: prototype pollution may lead to DoS or remote code execution"
}
]
}
RHSA-2021:1186
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for org.ovirt.engine-root, ovirt-engine-ui-extensions, and ovirt-web-ui is now available for Red Hat Virtualization Engine 4.4.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The ovirt-engine package provides the manager for virtualization environments.\nThis manager enables admins to define hosts and networks, as well as to add\nstorage, create VMs and manage user permissions.\n\nBug Fix(es):\n* Previously, saving user preferences in the Red Hat Virtualization Manager required the MANIPULATE_USERS permission level. As a result, user preferences were not saved on the server.\nIn this release, the required permission level for saving user preferences was changed to EDIT_PROFILE, which is the permission level assigned by default to all users. As a result, saving user preferences works as expected. (BZ#1920539)\n\nA list of bugs fixed in this update is available in the Technical Notes\nbook:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes\n\nSecurity Fix(es):\n\n* nodejs-bootstrap-select: not escaping title values on \u003coption\u003e may lead to XSS (CVE-2019-20921)\n\n* datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name (CVE-2020-28458)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:1186",
"url": "https://access.redhat.com/errata/RHSA-2021:1186"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes",
"url": "https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes"
},
{
"category": "external",
"summary": "1171924",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171924"
},
{
"category": "external",
"summary": "1750426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1750426"
},
{
"category": "external",
"summary": "1795457",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1795457"
},
{
"category": "external",
"summary": "1882273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882273"
},
{
"category": "external",
"summary": "1908441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908441"
},
{
"category": "external",
"summary": "1920539",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920539"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1186.json"
}
],
"title": "Red Hat Security Advisory: RHV Manager (ovirt-engine) 4.4.z [ovirt-4.4.5] 0-day security, bug fix, enhance",
"tracking": {
"current_release_date": "2025-10-09T20:47:19+00:00",
"generator": {
"date": "2025-10-09T20:47:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:1186",
"initial_release_date": "2021-04-14T16:34:35+00:00",
"revision_history": [
{
"date": "2021-04-14T16:34:35+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-04-14T16:34:35+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:47:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product": {
"name": "RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhev_manager:4.4:el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src",
"product": {
"name": "ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src",
"product_id": "ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-ui-extensions@1.2.5-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "ovirt-web-ui-0:1.6.8-1.el8ev.src",
"product": {
"name": "ovirt-web-ui-0:1.6.8-1.el8ev.src",
"product_id": "ovirt-web-ui-0:1.6.8-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-web-ui@1.6.8-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-0:4.4.5.11-0.1.el8ev.src",
"product": {
"name": "ovirt-engine-0:4.4.5.11-0.1.el8ev.src",
"product_id": "ovirt-engine-0:4.4.5.11-0.1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine@4.4.5.11-0.1.el8ev?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch",
"product": {
"name": "ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch",
"product_id": "ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-ui-extensions@1.2.5-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-web-ui-0:1.6.8-1.el8ev.noarch",
"product": {
"name": "ovirt-web-ui-0:1.6.8-1.el8ev.noarch",
"product_id": "ovirt-web-ui-0:1.6.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-web-ui@1.6.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-backend@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-dbscripts@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-health-check-bundler@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-restapi@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-base@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-cinderlib@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-imageio@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-ovirt-engine@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-ovirt-engine-common@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-vmconsole-proxy-helper@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-websocket-proxy@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-tools@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-tools-backup@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-vmconsole-proxy-helper@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-webadmin-portal@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-websocket-proxy@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ovirt-engine-lib@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhvm-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "rhvm-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "rhvm-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhvm@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-0:4.4.5.11-0.1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.src"
},
"product_reference": "ovirt-engine-0:4.4.5.11-0.1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch"
},
"product_reference": "ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src"
},
"product_reference": "ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-web-ui-0:1.6.8-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.noarch"
},
"product_reference": "ovirt-web-ui-0:1.6.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-web-ui-0:1.6.8-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.src"
},
"product_reference": "ovirt-web-ui-0:1.6.8-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhvm-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:rhvm-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "rhvm-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-20921",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2020-09-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.11-0.1.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1882273"
}
],
"notes": [
{
"category": "description",
"text": "bootstrap-select before 1.13.6 allows Cross-Site Scripting (XSS). It does not escape title values in OPTION elements. This may allow attackers to execute arbitrary JavaScript in a victim\u0027s browser.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-bootstrap-select: not escaping title values on \u003coption\u003e may lead to XSS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In OpenShift Service Mesh (OSSM) the openshift-service-mesh/kiali-rhel7 container (which installs the kiali rpm) is behind OpenShift OAuth authentication restricting access to the vulnerable bootstrap-select library to authenticated users only, therefore the impact is low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src"
],
"known_not_affected": [
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.11-0.1.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-20921"
},
{
"category": "external",
"summary": "RHBZ#1882273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882273"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20921"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20921",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20921"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-9r7h-6639-v5mw",
"url": "https://github.com/advisories/GHSA-9r7h-6639-v5mw"
},
{
"category": "external",
"summary": "https://snyk.io/vuln/SNYK-JS-BOOTSTRAPSELECT-570457",
"url": "https://snyk.io/vuln/SNYK-JS-BOOTSTRAPSELECT-570457"
}
],
"release_date": "2019-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T16:34:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1186"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.11-0.1.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-bootstrap-select: not escaping title values on \u003coption\u003e may lead to XSS"
},
{
"cve": "CVE-2020-28458",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2020-12-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.11-0.1.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1908441"
}
],
"notes": [
{
"category": "description",
"text": "All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift console container does package a vulnerable version of datatables.net, however as access to the vulnerable component is restricted via OpenShift OAuth the vulnerability is rated with an impact of `Low`.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src"
],
"known_not_affected": [
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.11-0.1.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28458"
},
{
"category": "external",
"summary": "RHBZ#1908441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908441"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28458",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28458"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28458",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28458"
},
{
"category": "external",
"summary": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402",
"url": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402"
}
],
"release_date": "2020-10-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T16:34:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1186"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.11-0.1.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name"
}
]
}
rhsa-2021:1169
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Virtualization Engine 4.4.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The ovirt-engine package provides the manager for virtualization environments.\nThis manager enables admins to define hosts and networks, as well as to add\nstorage, create VMs and manage user permissions.\n\nA list of bugs fixed in this update is available in the Technical Notes\nbook:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes\n\nSecurity Fix(es):\n\n* nodejs-bootstrap-select: not escaping title values on \u003coption\u003e may lead to XSS (CVE-2019-20921)\n\n* m2crypto: bleichenbacher timing attacks in the RSA decryption API (CVE-2020-25657)\n\n* datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name (CVE-2020-28458)\n\n* nodejs-immer: prototype pollution may lead to DoS or remote code execution (CVE-2020-28477)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:1169",
"url": "https://access.redhat.com/errata/RHSA-2021:1169"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes",
"url": "https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes"
},
{
"category": "external",
"summary": "1145658",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1145658"
},
{
"category": "external",
"summary": "1155275",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1155275"
},
{
"category": "external",
"summary": "1649479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1649479"
},
{
"category": "external",
"summary": "1666786",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666786"
},
{
"category": "external",
"summary": "1688186",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1688186"
},
{
"category": "external",
"summary": "1729359",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1729359"
},
{
"category": "external",
"summary": "1787235",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1787235"
},
{
"category": "external",
"summary": "1802844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802844"
},
{
"category": "external",
"summary": "1837221",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1837221"
},
{
"category": "external",
"summary": "1843882",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1843882"
},
{
"category": "external",
"summary": "1858420",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1858420"
},
{
"category": "external",
"summary": "1882273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882273"
},
{
"category": "external",
"summary": "1884233",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1884233"
},
{
"category": "external",
"summary": "1889823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889823"
},
{
"category": "external",
"summary": "1895217",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895217"
},
{
"category": "external",
"summary": "1901503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901503"
},
{
"category": "external",
"summary": "1901752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901752"
},
{
"category": "external",
"summary": "1905108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905108"
},
{
"category": "external",
"summary": "1905158",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905158"
},
{
"category": "external",
"summary": "1908441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908441"
},
{
"category": "external",
"summary": "1910302",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1910302"
},
{
"category": "external",
"summary": "1913198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913198"
},
{
"category": "external",
"summary": "1914602",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1914602"
},
{
"category": "external",
"summary": "1918162",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918162"
},
{
"category": "external",
"summary": "1919555",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919555"
},
{
"category": "external",
"summary": "1921104",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921104"
},
{
"category": "external",
"summary": "1921119",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921119"
},
{
"category": "external",
"summary": "1922200",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922200"
},
{
"category": "external",
"summary": "1924012",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1924012"
},
{
"category": "external",
"summary": "1926854",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1926854"
},
{
"category": "external",
"summary": "1927851",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927851"
},
{
"category": "external",
"summary": "1931514",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1931514"
},
{
"category": "external",
"summary": "1931786",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1931786"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1169.json"
}
],
"title": "Red Hat Security Advisory: RHV Manager (ovirt-engine) 4.4.z [ovirt-4.4.5] security, bug fix, enhancement",
"tracking": {
"current_release_date": "2025-10-09T20:24:44+00:00",
"generator": {
"date": "2025-10-09T20:24:44+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:1169",
"initial_release_date": "2021-04-14T16:34:39+00:00",
"revision_history": [
{
"date": "2021-04-14T16:34:39+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-04-14T16:34:39+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:24:44+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product": {
"name": "RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhev_manager:4.4:el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-sshd-0:2.6.0-1.el8ev.src",
"product": {
"name": "apache-sshd-0:2.6.0-1.el8ev.src",
"product_id": "apache-sshd-0:2.6.0-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-sshd@2.6.0-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-runner-service-0:1.0.7-1.el8ev.src",
"product": {
"name": "ansible-runner-service-0:1.0.7-1.el8ev.src",
"product_id": "ansible-runner-service-0:1.0.7-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-runner-service@1.0.7-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-runner-0:1.4.6-2.el8ar.src",
"product": {
"name": "ansible-runner-0:1.4.6-2.el8ar.src",
"product_id": "ansible-runner-0:1.4.6-2.el8ar.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-runner@1.4.6-2.el8ar?arch=src"
}
}
},
{
"category": "product_version",
"name": "ovirt-web-ui-0:1.6.7-1.el8ev.src",
"product": {
"name": "ovirt-web-ui-0:1.6.7-1.el8ev.src",
"product_id": "ovirt-web-ui-0:1.6.7-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-web-ui@1.6.7-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"product": {
"name": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"product_id": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-dwh@4.4.5.5-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"product": {
"name": "ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"product_id": "ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine@4.4.5.9-0.1.el8ev?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-sshd-0:2.6.0-1.el8ev.noarch",
"product": {
"name": "apache-sshd-0:2.6.0-1.el8ev.noarch",
"product_id": "apache-sshd-0:2.6.0-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-sshd@2.6.0-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"product": {
"name": "apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"product_id": "apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-sshd-javadoc@2.6.0-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"product": {
"name": "ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"product_id": "ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-runner-service@1.0.7-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-runner-0:1.4.6-2.el8ar.noarch",
"product": {
"name": "ansible-runner-0:1.4.6-2.el8ar.noarch",
"product_id": "ansible-runner-0:1.4.6-2.el8ar.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-runner@1.4.6-2.el8ar?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"product": {
"name": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"product_id": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ansible-runner@1.4.6-2.el8ar?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"product": {
"name": "ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"product_id": "ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-web-ui@1.6.7-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"product": {
"name": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"product_id": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-dwh@4.4.5.5-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"product": {
"name": "ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"product_id": "ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-dwh-grafana-integration-setup@4.4.5.5-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"product": {
"name": "ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"product_id": "ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-dwh-setup@4.4.5.5-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-backend@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-dbscripts@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-health-check-bundler@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-restapi@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-base@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-cinderlib@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-imageio@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-ovirt-engine@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-ovirt-engine-common@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-vmconsole-proxy-helper@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-websocket-proxy@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-tools@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-tools-backup@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-vmconsole-proxy-helper@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-webadmin-portal@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-websocket-proxy@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ovirt-engine-lib@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhvm-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "rhvm-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "rhvm-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhvm@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-runner-0:1.4.6-2.el8ar.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch"
},
"product_reference": "ansible-runner-0:1.4.6-2.el8ar.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-runner-0:1.4.6-2.el8ar.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src"
},
"product_reference": "ansible-runner-0:1.4.6-2.el8ar.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-runner-service-0:1.0.7-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch"
},
"product_reference": "ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-runner-service-0:1.0.7-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src"
},
"product_reference": "ansible-runner-service-0:1.0.7-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-sshd-0:2.6.0-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch"
},
"product_reference": "apache-sshd-0:2.6.0-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-sshd-0:2.6.0-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src"
},
"product_reference": "apache-sshd-0:2.6.0-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch"
},
"product_reference": "apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-0:4.4.5.9-0.1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src"
},
"product_reference": "ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch"
},
"product_reference": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src"
},
"product_reference": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch"
},
"product_reference": "ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch"
},
"product_reference": "ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-web-ui-0:1.6.7-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch"
},
"product_reference": "ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-web-ui-0:1.6.7-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
},
"product_reference": "ovirt-web-ui-0:1.6.7-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch"
},
"product_reference": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhvm-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "rhvm-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-20921",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2020-09-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1882273"
}
],
"notes": [
{
"category": "description",
"text": "bootstrap-select before 1.13.6 allows Cross-Site Scripting (XSS). It does not escape title values in OPTION elements. This may allow attackers to execute arbitrary JavaScript in a victim\u0027s browser.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-bootstrap-select: not escaping title values on \u003coption\u003e may lead to XSS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In OpenShift Service Mesh (OSSM) the openshift-service-mesh/kiali-rhel7 container (which installs the kiali rpm) is behind OpenShift OAuth authentication restricting access to the vulnerable bootstrap-select library to authenticated users only, therefore the impact is low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
],
"known_not_affected": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-20921"
},
{
"category": "external",
"summary": "RHBZ#1882273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882273"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20921"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20921",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20921"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-9r7h-6639-v5mw",
"url": "https://github.com/advisories/GHSA-9r7h-6639-v5mw"
},
{
"category": "external",
"summary": "https://snyk.io/vuln/SNYK-JS-BOOTSTRAPSELECT-570457",
"url": "https://snyk.io/vuln/SNYK-JS-BOOTSTRAPSELECT-570457"
}
],
"release_date": "2019-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T16:34:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1169"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-bootstrap-select: not escaping title values on \u003coption\u003e may lead to XSS"
},
{
"cve": "CVE-2020-25657",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2020-10-19T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1889823"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in all released versions of m2crypto, where they are vulnerable to Bleichenbacher timing attacks in the RSA decryption API via the timed processing of valid PKCS#1 v1.5 Ciphertext. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "m2crypto: bleichenbacher timing attacks in the RSA decryption API",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
],
"known_not_affected": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-25657"
},
{
"category": "external",
"summary": "RHBZ#1889823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889823"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-25657",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25657"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25657",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25657"
}
],
"release_date": "2020-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T16:34:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1169"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "m2crypto: bleichenbacher timing attacks in the RSA decryption API"
},
{
"cve": "CVE-2020-28458",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2020-12-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1908441"
}
],
"notes": [
{
"category": "description",
"text": "All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift console container does package a vulnerable version of datatables.net, however as access to the vulnerable component is restricted via OpenShift OAuth the vulnerability is rated with an impact of `Low`.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
],
"known_not_affected": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28458"
},
{
"category": "external",
"summary": "RHBZ#1908441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908441"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28458",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28458"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28458",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28458"
},
{
"category": "external",
"summary": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402",
"url": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402"
}
],
"release_date": "2020-10-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T16:34:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1169"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name"
},
{
"cve": "CVE-2020-28477",
"cwe": {
"id": "CWE-915",
"name": "Improperly Controlled Modification of Dynamically-Determined Object Attributes"
},
"discovery_date": "2021-01-20T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1918162"
}
],
"notes": [
{
"category": "description",
"text": "This affects all versions of package immer.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-immer: prototype pollution may lead to DoS or remote code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Virtualization includes affected version of nodejs-immer, however the usage does not meet the conditions required to exploit the flaw, therefore the impact is Low.\n\nIn OpenShift Container Platform 4.6 (OCP) the openshift4/ose-prometheus container ships the vulnerable version of the nodejs-immer, however the Prometheus react-ui is disabled, hence this flaw cannot be exploited. As openshift4/ose-prometheus container still packages the vulnerable code, this component is affected with impact Low. This may be fixed in a future release.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
],
"known_not_affected": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28477"
},
{
"category": "external",
"summary": "RHBZ#1918162",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918162"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28477",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28477"
},
{
"category": "external",
"summary": "https://snyk.io/vuln/SNYK-JS-IMMER-1019369",
"url": "https://snyk.io/vuln/SNYK-JS-IMMER-1019369"
}
],
"release_date": "2021-01-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T16:34:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1169"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "nodejs-immer: prototype pollution may lead to DoS or remote code execution"
}
]
}
rhsa-2021:1186
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for org.ovirt.engine-root, ovirt-engine-ui-extensions, and ovirt-web-ui is now available for Red Hat Virtualization Engine 4.4.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The ovirt-engine package provides the manager for virtualization environments.\nThis manager enables admins to define hosts and networks, as well as to add\nstorage, create VMs and manage user permissions.\n\nBug Fix(es):\n* Previously, saving user preferences in the Red Hat Virtualization Manager required the MANIPULATE_USERS permission level. As a result, user preferences were not saved on the server.\nIn this release, the required permission level for saving user preferences was changed to EDIT_PROFILE, which is the permission level assigned by default to all users. As a result, saving user preferences works as expected. (BZ#1920539)\n\nA list of bugs fixed in this update is available in the Technical Notes\nbook:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes\n\nSecurity Fix(es):\n\n* nodejs-bootstrap-select: not escaping title values on \u003coption\u003e may lead to XSS (CVE-2019-20921)\n\n* datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name (CVE-2020-28458)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:1186",
"url": "https://access.redhat.com/errata/RHSA-2021:1186"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes",
"url": "https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes"
},
{
"category": "external",
"summary": "1171924",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171924"
},
{
"category": "external",
"summary": "1750426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1750426"
},
{
"category": "external",
"summary": "1795457",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1795457"
},
{
"category": "external",
"summary": "1882273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882273"
},
{
"category": "external",
"summary": "1908441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908441"
},
{
"category": "external",
"summary": "1920539",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920539"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1186.json"
}
],
"title": "Red Hat Security Advisory: RHV Manager (ovirt-engine) 4.4.z [ovirt-4.4.5] 0-day security, bug fix, enhance",
"tracking": {
"current_release_date": "2025-10-09T20:47:19+00:00",
"generator": {
"date": "2025-10-09T20:47:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:1186",
"initial_release_date": "2021-04-14T16:34:35+00:00",
"revision_history": [
{
"date": "2021-04-14T16:34:35+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-04-14T16:34:35+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:47:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product": {
"name": "RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhev_manager:4.4:el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src",
"product": {
"name": "ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src",
"product_id": "ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-ui-extensions@1.2.5-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "ovirt-web-ui-0:1.6.8-1.el8ev.src",
"product": {
"name": "ovirt-web-ui-0:1.6.8-1.el8ev.src",
"product_id": "ovirt-web-ui-0:1.6.8-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-web-ui@1.6.8-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-0:4.4.5.11-0.1.el8ev.src",
"product": {
"name": "ovirt-engine-0:4.4.5.11-0.1.el8ev.src",
"product_id": "ovirt-engine-0:4.4.5.11-0.1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine@4.4.5.11-0.1.el8ev?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch",
"product": {
"name": "ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch",
"product_id": "ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-ui-extensions@1.2.5-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-web-ui-0:1.6.8-1.el8ev.noarch",
"product": {
"name": "ovirt-web-ui-0:1.6.8-1.el8ev.noarch",
"product_id": "ovirt-web-ui-0:1.6.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-web-ui@1.6.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-backend@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-dbscripts@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-health-check-bundler@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-restapi@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-base@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-cinderlib@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-imageio@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-ovirt-engine@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-ovirt-engine-common@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-vmconsole-proxy-helper@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-websocket-proxy@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-tools@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-tools-backup@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-vmconsole-proxy-helper@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-webadmin-portal@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-websocket-proxy@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ovirt-engine-lib@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhvm-0:4.4.5.11-0.1.el8ev.noarch",
"product": {
"name": "rhvm-0:4.4.5.11-0.1.el8ev.noarch",
"product_id": "rhvm-0:4.4.5.11-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhvm@4.4.5.11-0.1.el8ev?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-0:4.4.5.11-0.1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.src"
},
"product_reference": "ovirt-engine-0:4.4.5.11-0.1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch"
},
"product_reference": "ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src"
},
"product_reference": "ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-web-ui-0:1.6.8-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.noarch"
},
"product_reference": "ovirt-web-ui-0:1.6.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-web-ui-0:1.6.8-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.src"
},
"product_reference": "ovirt-web-ui-0:1.6.8-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhvm-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:rhvm-0:4.4.5.11-0.1.el8ev.noarch"
},
"product_reference": "rhvm-0:4.4.5.11-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-20921",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2020-09-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.11-0.1.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1882273"
}
],
"notes": [
{
"category": "description",
"text": "bootstrap-select before 1.13.6 allows Cross-Site Scripting (XSS). It does not escape title values in OPTION elements. This may allow attackers to execute arbitrary JavaScript in a victim\u0027s browser.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-bootstrap-select: not escaping title values on \u003coption\u003e may lead to XSS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In OpenShift Service Mesh (OSSM) the openshift-service-mesh/kiali-rhel7 container (which installs the kiali rpm) is behind OpenShift OAuth authentication restricting access to the vulnerable bootstrap-select library to authenticated users only, therefore the impact is low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src"
],
"known_not_affected": [
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.11-0.1.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-20921"
},
{
"category": "external",
"summary": "RHBZ#1882273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882273"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20921"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20921",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20921"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-9r7h-6639-v5mw",
"url": "https://github.com/advisories/GHSA-9r7h-6639-v5mw"
},
{
"category": "external",
"summary": "https://snyk.io/vuln/SNYK-JS-BOOTSTRAPSELECT-570457",
"url": "https://snyk.io/vuln/SNYK-JS-BOOTSTRAPSELECT-570457"
}
],
"release_date": "2019-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T16:34:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1186"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.11-0.1.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-bootstrap-select: not escaping title values on \u003coption\u003e may lead to XSS"
},
{
"cve": "CVE-2020-28458",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2020-12-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.11-0.1.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1908441"
}
],
"notes": [
{
"category": "description",
"text": "All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift console container does package a vulnerable version of datatables.net, however as access to the vulnerable component is restricted via OpenShift OAuth the vulnerability is rated with an impact of `Low`.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src"
],
"known_not_affected": [
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.11-0.1.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28458"
},
{
"category": "external",
"summary": "RHBZ#1908441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908441"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28458",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28458"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28458",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28458"
},
{
"category": "external",
"summary": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402",
"url": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402"
}
],
"release_date": "2020-10-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T16:34:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1186"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.11-0.1.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name"
}
]
}
RHSA-2021:1169
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Virtualization Engine 4.4.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The ovirt-engine package provides the manager for virtualization environments.\nThis manager enables admins to define hosts and networks, as well as to add\nstorage, create VMs and manage user permissions.\n\nA list of bugs fixed in this update is available in the Technical Notes\nbook:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes\n\nSecurity Fix(es):\n\n* nodejs-bootstrap-select: not escaping title values on \u003coption\u003e may lead to XSS (CVE-2019-20921)\n\n* m2crypto: bleichenbacher timing attacks in the RSA decryption API (CVE-2020-25657)\n\n* datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name (CVE-2020-28458)\n\n* nodejs-immer: prototype pollution may lead to DoS or remote code execution (CVE-2020-28477)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:1169",
"url": "https://access.redhat.com/errata/RHSA-2021:1169"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes",
"url": "https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes"
},
{
"category": "external",
"summary": "1145658",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1145658"
},
{
"category": "external",
"summary": "1155275",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1155275"
},
{
"category": "external",
"summary": "1649479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1649479"
},
{
"category": "external",
"summary": "1666786",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666786"
},
{
"category": "external",
"summary": "1688186",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1688186"
},
{
"category": "external",
"summary": "1729359",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1729359"
},
{
"category": "external",
"summary": "1787235",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1787235"
},
{
"category": "external",
"summary": "1802844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802844"
},
{
"category": "external",
"summary": "1837221",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1837221"
},
{
"category": "external",
"summary": "1843882",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1843882"
},
{
"category": "external",
"summary": "1858420",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1858420"
},
{
"category": "external",
"summary": "1882273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882273"
},
{
"category": "external",
"summary": "1884233",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1884233"
},
{
"category": "external",
"summary": "1889823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889823"
},
{
"category": "external",
"summary": "1895217",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895217"
},
{
"category": "external",
"summary": "1901503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901503"
},
{
"category": "external",
"summary": "1901752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901752"
},
{
"category": "external",
"summary": "1905108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905108"
},
{
"category": "external",
"summary": "1905158",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905158"
},
{
"category": "external",
"summary": "1908441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908441"
},
{
"category": "external",
"summary": "1910302",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1910302"
},
{
"category": "external",
"summary": "1913198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913198"
},
{
"category": "external",
"summary": "1914602",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1914602"
},
{
"category": "external",
"summary": "1918162",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918162"
},
{
"category": "external",
"summary": "1919555",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919555"
},
{
"category": "external",
"summary": "1921104",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921104"
},
{
"category": "external",
"summary": "1921119",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921119"
},
{
"category": "external",
"summary": "1922200",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922200"
},
{
"category": "external",
"summary": "1924012",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1924012"
},
{
"category": "external",
"summary": "1926854",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1926854"
},
{
"category": "external",
"summary": "1927851",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927851"
},
{
"category": "external",
"summary": "1931514",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1931514"
},
{
"category": "external",
"summary": "1931786",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1931786"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1169.json"
}
],
"title": "Red Hat Security Advisory: RHV Manager (ovirt-engine) 4.4.z [ovirt-4.4.5] security, bug fix, enhancement",
"tracking": {
"current_release_date": "2025-10-09T20:24:44+00:00",
"generator": {
"date": "2025-10-09T20:24:44+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:1169",
"initial_release_date": "2021-04-14T16:34:39+00:00",
"revision_history": [
{
"date": "2021-04-14T16:34:39+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-04-14T16:34:39+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:24:44+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product": {
"name": "RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhev_manager:4.4:el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-sshd-0:2.6.0-1.el8ev.src",
"product": {
"name": "apache-sshd-0:2.6.0-1.el8ev.src",
"product_id": "apache-sshd-0:2.6.0-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-sshd@2.6.0-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-runner-service-0:1.0.7-1.el8ev.src",
"product": {
"name": "ansible-runner-service-0:1.0.7-1.el8ev.src",
"product_id": "ansible-runner-service-0:1.0.7-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-runner-service@1.0.7-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-runner-0:1.4.6-2.el8ar.src",
"product": {
"name": "ansible-runner-0:1.4.6-2.el8ar.src",
"product_id": "ansible-runner-0:1.4.6-2.el8ar.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-runner@1.4.6-2.el8ar?arch=src"
}
}
},
{
"category": "product_version",
"name": "ovirt-web-ui-0:1.6.7-1.el8ev.src",
"product": {
"name": "ovirt-web-ui-0:1.6.7-1.el8ev.src",
"product_id": "ovirt-web-ui-0:1.6.7-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-web-ui@1.6.7-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"product": {
"name": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"product_id": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-dwh@4.4.5.5-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"product": {
"name": "ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"product_id": "ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine@4.4.5.9-0.1.el8ev?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-sshd-0:2.6.0-1.el8ev.noarch",
"product": {
"name": "apache-sshd-0:2.6.0-1.el8ev.noarch",
"product_id": "apache-sshd-0:2.6.0-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-sshd@2.6.0-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"product": {
"name": "apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"product_id": "apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-sshd-javadoc@2.6.0-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"product": {
"name": "ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"product_id": "ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-runner-service@1.0.7-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-runner-0:1.4.6-2.el8ar.noarch",
"product": {
"name": "ansible-runner-0:1.4.6-2.el8ar.noarch",
"product_id": "ansible-runner-0:1.4.6-2.el8ar.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-runner@1.4.6-2.el8ar?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"product": {
"name": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"product_id": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ansible-runner@1.4.6-2.el8ar?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"product": {
"name": "ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"product_id": "ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-web-ui@1.6.7-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"product": {
"name": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"product_id": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-dwh@4.4.5.5-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"product": {
"name": "ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"product_id": "ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-dwh-grafana-integration-setup@4.4.5.5-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"product": {
"name": "ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"product_id": "ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-dwh-setup@4.4.5.5-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-backend@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-dbscripts@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-health-check-bundler@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-restapi@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-base@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-cinderlib@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-imageio@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-ovirt-engine@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-ovirt-engine-common@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-vmconsole-proxy-helper@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-websocket-proxy@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-tools@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-tools-backup@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-vmconsole-proxy-helper@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-webadmin-portal@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-websocket-proxy@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ovirt-engine-lib@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhvm-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "rhvm-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "rhvm-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhvm@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-runner-0:1.4.6-2.el8ar.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch"
},
"product_reference": "ansible-runner-0:1.4.6-2.el8ar.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-runner-0:1.4.6-2.el8ar.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src"
},
"product_reference": "ansible-runner-0:1.4.6-2.el8ar.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-runner-service-0:1.0.7-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch"
},
"product_reference": "ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-runner-service-0:1.0.7-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src"
},
"product_reference": "ansible-runner-service-0:1.0.7-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-sshd-0:2.6.0-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch"
},
"product_reference": "apache-sshd-0:2.6.0-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-sshd-0:2.6.0-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src"
},
"product_reference": "apache-sshd-0:2.6.0-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch"
},
"product_reference": "apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-0:4.4.5.9-0.1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src"
},
"product_reference": "ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch"
},
"product_reference": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src"
},
"product_reference": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch"
},
"product_reference": "ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch"
},
"product_reference": "ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-web-ui-0:1.6.7-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch"
},
"product_reference": "ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-web-ui-0:1.6.7-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
},
"product_reference": "ovirt-web-ui-0:1.6.7-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch"
},
"product_reference": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhvm-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "rhvm-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-20921",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2020-09-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1882273"
}
],
"notes": [
{
"category": "description",
"text": "bootstrap-select before 1.13.6 allows Cross-Site Scripting (XSS). It does not escape title values in OPTION elements. This may allow attackers to execute arbitrary JavaScript in a victim\u0027s browser.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-bootstrap-select: not escaping title values on \u003coption\u003e may lead to XSS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In OpenShift Service Mesh (OSSM) the openshift-service-mesh/kiali-rhel7 container (which installs the kiali rpm) is behind OpenShift OAuth authentication restricting access to the vulnerable bootstrap-select library to authenticated users only, therefore the impact is low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
],
"known_not_affected": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-20921"
},
{
"category": "external",
"summary": "RHBZ#1882273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882273"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20921"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20921",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20921"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-9r7h-6639-v5mw",
"url": "https://github.com/advisories/GHSA-9r7h-6639-v5mw"
},
{
"category": "external",
"summary": "https://snyk.io/vuln/SNYK-JS-BOOTSTRAPSELECT-570457",
"url": "https://snyk.io/vuln/SNYK-JS-BOOTSTRAPSELECT-570457"
}
],
"release_date": "2019-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T16:34:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1169"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-bootstrap-select: not escaping title values on \u003coption\u003e may lead to XSS"
},
{
"cve": "CVE-2020-25657",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2020-10-19T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1889823"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in all released versions of m2crypto, where they are vulnerable to Bleichenbacher timing attacks in the RSA decryption API via the timed processing of valid PKCS#1 v1.5 Ciphertext. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "m2crypto: bleichenbacher timing attacks in the RSA decryption API",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
],
"known_not_affected": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-25657"
},
{
"category": "external",
"summary": "RHBZ#1889823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889823"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-25657",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25657"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25657",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25657"
}
],
"release_date": "2020-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T16:34:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1169"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "m2crypto: bleichenbacher timing attacks in the RSA decryption API"
},
{
"cve": "CVE-2020-28458",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2020-12-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1908441"
}
],
"notes": [
{
"category": "description",
"text": "All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift console container does package a vulnerable version of datatables.net, however as access to the vulnerable component is restricted via OpenShift OAuth the vulnerability is rated with an impact of `Low`.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
],
"known_not_affected": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28458"
},
{
"category": "external",
"summary": "RHBZ#1908441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908441"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28458",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28458"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28458",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28458"
},
{
"category": "external",
"summary": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402",
"url": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402"
}
],
"release_date": "2020-10-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T16:34:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1169"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name"
},
{
"cve": "CVE-2020-28477",
"cwe": {
"id": "CWE-915",
"name": "Improperly Controlled Modification of Dynamically-Determined Object Attributes"
},
"discovery_date": "2021-01-20T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1918162"
}
],
"notes": [
{
"category": "description",
"text": "This affects all versions of package immer.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-immer: prototype pollution may lead to DoS or remote code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Virtualization includes affected version of nodejs-immer, however the usage does not meet the conditions required to exploit the flaw, therefore the impact is Low.\n\nIn OpenShift Container Platform 4.6 (OCP) the openshift4/ose-prometheus container ships the vulnerable version of the nodejs-immer, however the Prometheus react-ui is disabled, hence this flaw cannot be exploited. As openshift4/ose-prometheus container still packages the vulnerable code, this component is affected with impact Low. This may be fixed in a future release.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
],
"known_not_affected": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28477"
},
{
"category": "external",
"summary": "RHBZ#1918162",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918162"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28477",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28477"
},
{
"category": "external",
"summary": "https://snyk.io/vuln/SNYK-JS-IMMER-1019369",
"url": "https://snyk.io/vuln/SNYK-JS-IMMER-1019369"
}
],
"release_date": "2021-01-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T16:34:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1169"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "nodejs-immer: prototype pollution may lead to DoS or remote code execution"
}
]
}
rhsa-2021:1184
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated host packages that fix several bugs and add various enhancements are now available.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The ovirt-hosted-engine-setup package provides a self-hosted engine tool for the Red Hat Virtualization Manager. A self-hosted engine is a virtualized environment in which the Manager runs on a virtual machine on the hosts managed by the Manager.\nBug Fix(es):\n\n* In this release, it is now possible to enter a path to the OVA archive for local appliance installation using the cockpit-ovirt UI. (BZ#1755156)\n\n* Previously, following a successful migration on the Self-hosted Engine, he HA agent on the source host immediately moved to the state EngineDown, and shorly thereafter tried to start the engine locally, if the destination host didn\u0027t update the shared storage quickly enough, marking the Manager virtual machine as being up.\nAs a result, starting the virtual machine failed due to a shared lock held by the destination host. This also resulted in generating false alarms and notifications.\nIn this release, the HA agent first moves to the state EngineMaybeAway, providing the destination host more time to update the shared storage with the updated state. As a result, no notifications or false alarms are generated. \nNote: in scenarios where the virtual machine needs to be started on the source host, this fix slightly increases the time it takes the Manager virtual\nmachine on the source host to start. (BZ#1815589)\n\n* Previously, if a host in the Self-hosted Engine had an ID number higher than 64, other hosts did not recognize that host, and the host did not appear in \u0027hosted-engine --vm-status\u0027.\nIn this release, the Self-hosted Engine allows host ID numbers of up to 2000. (BZ#1916032)\n\n* ovirt-hosted-engine-setup now requires ansible-2.9.17. (BZ#1921108)\n\n* Previously the logical names for disks without a mounted filesystem were not displayed in the Red Hat Virtualization Manager. \nIn this release, logical names for such disks are properly reported provided the version of QEMU Guest Agent in the virtual machine is 5.2 or higher. (BZ#1836661)\n\n* Previously, if the Seal option was used when creating a template for Linux virtual machines, the original host name was not removed from the template. \nIn this release, the host name is set to localhost or the new virtual machine host name. (BZ#1860492)\n\n* Previously, the used memory of the host didn\u0027t take the SReclaimable memory into consideration while it did for free memory. As a result, there were discrepancies in the host statistics. \nIn this release, the SReclaimable memory is a part of the used memory calculation. (BZ#1916519)\n\nSecurity Fix(es):\n\n* datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name (CVE-2020-28458)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:1184",
"url": "https://access.redhat.com/errata/RHSA-2021:1184"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1755156",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755156"
},
{
"category": "external",
"summary": "1796415",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796415"
},
{
"category": "external",
"summary": "1815589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815589"
},
{
"category": "external",
"summary": "1836661",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1836661"
},
{
"category": "external",
"summary": "1860492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860492"
},
{
"category": "external",
"summary": "1870435",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1870435"
},
{
"category": "external",
"summary": "1901503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901503"
},
{
"category": "external",
"summary": "1908441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908441"
},
{
"category": "external",
"summary": "1909956",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1909956"
},
{
"category": "external",
"summary": "1916032",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1916032"
},
{
"category": "external",
"summary": "1916519",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1916519"
},
{
"category": "external",
"summary": "1916947",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1916947"
},
{
"category": "external",
"summary": "1917927",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917927"
},
{
"category": "external",
"summary": "1919246",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919246"
},
{
"category": "external",
"summary": "1921014",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921014"
},
{
"category": "external",
"summary": "1921108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921108"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1184.json"
}
],
"title": "Red Hat Security Advisory: RHV RHEL Host (ovirt-host) 4.4.z [ovirt-4.4.5] security, bug fix, enhancement",
"tracking": {
"current_release_date": "2025-10-09T20:47:19+00:00",
"generator": {
"date": "2025-10-09T20:47:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:1184",
"initial_release_date": "2021-04-14T11:41:44+00:00",
"revision_history": [
{
"date": "2021-04-14T11:41:44+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-04-14T11:41:44+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:47:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product": {
"name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "v2v-conversion-host-0:1.16.2-10.el8ev.src",
"product": {
"name": "v2v-conversion-host-0:1.16.2-10.el8ev.src",
"product_id": "v2v-conversion-host-0:1.16.2-10.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/v2v-conversion-host@1.16.2-10.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "ovirt-host-0:4.4.5-1.el8ev.src",
"product": {
"name": "ovirt-host-0:4.4.5-1.el8ev.src",
"product_id": "ovirt-host-0:4.4.5-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-host@4.4.5-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.src",
"product": {
"name": "ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.src",
"product_id": "ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-hosted-engine-setup@2.4.9-4.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.src",
"product": {
"name": "ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.src",
"product_id": "ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-hosted-engine-ha@2.4.6-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "cockpit-ovirt-0:0.14.20-1.el8ev.src",
"product": {
"name": "cockpit-ovirt-0:0.14.20-1.el8ev.src",
"product_id": "cockpit-ovirt-0:0.14.20-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cockpit-ovirt@0.14.20-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "vdsm-0:4.40.50.8-1.el8ev.src",
"product": {
"name": "vdsm-0:4.40.50.8-1.el8ev.src",
"product_id": "vdsm-0:4.40.50.8-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm@4.40.50.8-1.el8ev?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch",
"product": {
"name": "v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch",
"product_id": "v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/v2v-conversion-host-wrapper@1.16.2-10.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch",
"product": {
"name": "v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch",
"product_id": "v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/v2v-conversion-host-ansible@1.16.2-10.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.noarch",
"product": {
"name": "ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.noarch",
"product_id": "ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-hosted-engine-setup@2.4.9-4.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.noarch",
"product": {
"name": "ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.noarch",
"product_id": "ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-hosted-engine-ha@2.4.6-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "cockpit-ovirt-dashboard-0:0.14.20-1.el8ev.noarch",
"product": {
"name": "cockpit-ovirt-dashboard-0:0.14.20-1.el8ev.noarch",
"product_id": "cockpit-ovirt-dashboard-0:0.14.20-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cockpit-ovirt-dashboard@0.14.20-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-api-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-api-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-api-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-api@4.40.50.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-client-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-client-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-client-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-client@4.40.50.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-common-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-common-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-common-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-common@4.40.50.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-cpuflags@4.40.50.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-ethtool-options@4.40.50.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-fcoe@4.40.50.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-localdisk@4.40.50.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-nestedvt@4.40.50.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-openstacknet@4.40.50.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-vhostmd@4.40.50.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-vmfex-dev@4.40.50.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-http-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-http-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-http-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-http@4.40.50.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-jsonrpc@4.40.50.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-python-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-python-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-python-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-python@4.40.50.8-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch",
"product": {
"name": "vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch",
"product_id": "vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-yajsonrpc@4.40.50.8-1.el8ev?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "ovirt-host-0:4.4.5-1.el8ev.x86_64",
"product": {
"name": "ovirt-host-0:4.4.5-1.el8ev.x86_64",
"product_id": "ovirt-host-0:4.4.5-1.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-host@4.4.5-1.el8ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovirt-host-dependencies-0:4.4.5-1.el8ev.x86_64",
"product": {
"name": "ovirt-host-dependencies-0:4.4.5-1.el8ev.x86_64",
"product_id": "ovirt-host-dependencies-0:4.4.5-1.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-host-dependencies@4.4.5-1.el8ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vdsm-0:4.40.50.8-1.el8ev.x86_64",
"product": {
"name": "vdsm-0:4.40.50.8-1.el8ev.x86_64",
"product_id": "vdsm-0:4.40.50.8-1.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm@4.40.50.8-1.el8ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64",
"product": {
"name": "vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64",
"product_id": "vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-gluster@4.40.50.8-1.el8ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64",
"product": {
"name": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64",
"product_id": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-checkips@4.40.50.8-1.el8ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64",
"product": {
"name": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64",
"product_id": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-extra-ipv4-addrs@4.40.50.8-1.el8ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vdsm-network-0:4.40.50.8-1.el8ev.x86_64",
"product": {
"name": "vdsm-network-0:4.40.50.8-1.el8ev.x86_64",
"product_id": "vdsm-network-0:4.40.50.8-1.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-network@4.40.50.8-1.el8ev?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovirt-host-0:4.4.5-1.el8ev.ppc64le",
"product": {
"name": "ovirt-host-0:4.4.5-1.el8ev.ppc64le",
"product_id": "ovirt-host-0:4.4.5-1.el8ev.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-host@4.4.5-1.el8ev?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovirt-host-dependencies-0:4.4.5-1.el8ev.ppc64le",
"product": {
"name": "ovirt-host-dependencies-0:4.4.5-1.el8ev.ppc64le",
"product_id": "ovirt-host-dependencies-0:4.4.5-1.el8ev.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-host-dependencies@4.4.5-1.el8ev?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "vdsm-0:4.40.50.8-1.el8ev.ppc64le",
"product": {
"name": "vdsm-0:4.40.50.8-1.el8ev.ppc64le",
"product_id": "vdsm-0:4.40.50.8-1.el8ev.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm@4.40.50.8-1.el8ev?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le",
"product": {
"name": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le",
"product_id": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-checkips@4.40.50.8-1.el8ev?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le",
"product": {
"name": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le",
"product_id": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-extra-ipv4-addrs@4.40.50.8-1.el8ev?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "vdsm-network-0:4.40.50.8-1.el8ev.ppc64le",
"product": {
"name": "vdsm-network-0:4.40.50.8-1.el8ev.ppc64le",
"product_id": "vdsm-network-0:4.40.50.8-1.el8ev.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-network@4.40.50.8-1.el8ev?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cockpit-ovirt-0:0.14.20-1.el8ev.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:cockpit-ovirt-0:0.14.20-1.el8ev.src"
},
"product_reference": "cockpit-ovirt-0:0.14.20-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cockpit-ovirt-dashboard-0:0.14.20-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.14.20-1.el8ev.noarch"
},
"product_reference": "cockpit-ovirt-dashboard-0:0.14.20-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-host-0:4.4.5-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:ovirt-host-0:4.4.5-1.el8ev.ppc64le"
},
"product_reference": "ovirt-host-0:4.4.5-1.el8ev.ppc64le",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-host-0:4.4.5-1.el8ev.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:ovirt-host-0:4.4.5-1.el8ev.src"
},
"product_reference": "ovirt-host-0:4.4.5-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-host-0:4.4.5-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:ovirt-host-0:4.4.5-1.el8ev.x86_64"
},
"product_reference": "ovirt-host-0:4.4.5-1.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-host-dependencies-0:4.4.5-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:ovirt-host-dependencies-0:4.4.5-1.el8ev.ppc64le"
},
"product_reference": "ovirt-host-dependencies-0:4.4.5-1.el8ev.ppc64le",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-host-dependencies-0:4.4.5-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:ovirt-host-dependencies-0:4.4.5-1.el8ev.x86_64"
},
"product_reference": "ovirt-host-dependencies-0:4.4.5-1.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.noarch"
},
"product_reference": "ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.src"
},
"product_reference": "ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.noarch"
},
"product_reference": "ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.src"
},
"product_reference": "ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.src",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "v2v-conversion-host-0:1.16.2-10.el8ev.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:v2v-conversion-host-0:1.16.2-10.el8ev.src"
},
"product_reference": "v2v-conversion-host-0:1.16.2-10.el8ev.src",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch"
},
"product_reference": "v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch"
},
"product_reference": "v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-0:4.40.50.8-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-0:4.40.50.8-1.el8ev.ppc64le"
},
"product_reference": "vdsm-0:4.40.50.8-1.el8ev.ppc64le",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-0:4.40.50.8-1.el8ev.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-0:4.40.50.8-1.el8ev.src"
},
"product_reference": "vdsm-0:4.40.50.8-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-0:4.40.50.8-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-0:4.40.50.8-1.el8ev.x86_64"
},
"product_reference": "vdsm-0:4.40.50.8-1.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-api-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-api-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-api-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-client-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-client-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-client-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-common-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-common-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-common-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64"
},
"product_reference": "vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le"
},
"product_reference": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64"
},
"product_reference": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le"
},
"product_reference": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64"
},
"product_reference": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-http-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-http-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-http-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-network-0:4.40.50.8-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-network-0:4.40.50.8-1.el8ev.ppc64le"
},
"product_reference": "vdsm-network-0:4.40.50.8-1.el8ev.ppc64le",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-network-0:4.40.50.8-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-network-0:4.40.50.8-1.el8ev.x86_64"
},
"product_reference": "vdsm-network-0:4.40.50.8-1.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-python-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-python-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-python-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "8Base-RHV-Agents-4:vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Agents-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "v2v-conversion-host-0:1.16.2-10.el8ev.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:v2v-conversion-host-0:1.16.2-10.el8ev.src"
},
"product_reference": "v2v-conversion-host-0:1.16.2-10.el8ev.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch"
},
"product_reference": "v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch"
},
"product_reference": "v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-0:4.40.50.8-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-0:4.40.50.8-1.el8ev.ppc64le"
},
"product_reference": "vdsm-0:4.40.50.8-1.el8ev.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-0:4.40.50.8-1.el8ev.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-0:4.40.50.8-1.el8ev.src"
},
"product_reference": "vdsm-0:4.40.50.8-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-0:4.40.50.8-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-0:4.40.50.8-1.el8ev.x86_64"
},
"product_reference": "vdsm-0:4.40.50.8-1.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-api-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-api-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-api-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-client-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-client-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-client-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-common-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-common-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-common-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64"
},
"product_reference": "vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le"
},
"product_reference": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64"
},
"product_reference": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le"
},
"product_reference": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64"
},
"product_reference": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-http-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-http-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-http-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-network-0:4.40.50.8-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-network-0:4.40.50.8-1.el8ev.ppc64le"
},
"product_reference": "vdsm-network-0:4.40.50.8-1.el8ev.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-network-0:4.40.50.8-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-network-0:4.40.50.8-1.el8ev.x86_64"
},
"product_reference": "vdsm-network-0:4.40.50.8-1.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-python-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-python-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-python-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch"
},
"product_reference": "vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-28458",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2020-12-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Agents-4:ovirt-host-0:4.4.5-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:ovirt-host-0:4.4.5-1.el8ev.src",
"8Base-RHV-Agents-4:ovirt-host-0:4.4.5-1.el8ev.x86_64",
"8Base-RHV-Agents-4:ovirt-host-dependencies-0:4.4.5-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:ovirt-host-dependencies-0:4.4.5-1.el8ev.x86_64",
"8Base-RHV-Agents-4:ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.noarch",
"8Base-RHV-Agents-4:ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.src",
"8Base-RHV-Agents-4:ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.noarch",
"8Base-RHV-Agents-4:ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.src",
"8Base-RHV-Agents-4:v2v-conversion-host-0:1.16.2-10.el8ev.src",
"8Base-RHV-Agents-4:v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch",
"8Base-RHV-Agents-4:v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:vdsm-0:4.40.50.8-1.el8ev.src",
"8Base-RHV-Agents-4:vdsm-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Agents-4:vdsm-api-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-client-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-common-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Agents-4:vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Agents-4:vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-http-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-network-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:vdsm-network-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Agents-4:vdsm-python-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:v2v-conversion-host-0:1.16.2-10.el8ev.src",
"8Base-RHV-Hypervisor-4:v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch",
"8Base-RHV-Hypervisor-4:v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Hypervisor-4:vdsm-0:4.40.50.8-1.el8ev.src",
"8Base-RHV-Hypervisor-4:vdsm-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Hypervisor-4:vdsm-api-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-client-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-common-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Hypervisor-4:vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Hypervisor-4:vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-http-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-network-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Hypervisor-4:vdsm-network-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Hypervisor-4:vdsm-python-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1908441"
}
],
"notes": [
{
"category": "description",
"text": "All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift console container does package a vulnerable version of datatables.net, however as access to the vulnerable component is restricted via OpenShift OAuth the vulnerability is rated with an impact of `Low`.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Agents-4:cockpit-ovirt-0:0.14.20-1.el8ev.src",
"8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.14.20-1.el8ev.noarch"
],
"known_not_affected": [
"8Base-RHV-Agents-4:ovirt-host-0:4.4.5-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:ovirt-host-0:4.4.5-1.el8ev.src",
"8Base-RHV-Agents-4:ovirt-host-0:4.4.5-1.el8ev.x86_64",
"8Base-RHV-Agents-4:ovirt-host-dependencies-0:4.4.5-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:ovirt-host-dependencies-0:4.4.5-1.el8ev.x86_64",
"8Base-RHV-Agents-4:ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.noarch",
"8Base-RHV-Agents-4:ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.src",
"8Base-RHV-Agents-4:ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.noarch",
"8Base-RHV-Agents-4:ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.src",
"8Base-RHV-Agents-4:v2v-conversion-host-0:1.16.2-10.el8ev.src",
"8Base-RHV-Agents-4:v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch",
"8Base-RHV-Agents-4:v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:vdsm-0:4.40.50.8-1.el8ev.src",
"8Base-RHV-Agents-4:vdsm-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Agents-4:vdsm-api-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-client-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-common-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Agents-4:vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Agents-4:vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-http-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-network-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:vdsm-network-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Agents-4:vdsm-python-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:v2v-conversion-host-0:1.16.2-10.el8ev.src",
"8Base-RHV-Hypervisor-4:v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch",
"8Base-RHV-Hypervisor-4:v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Hypervisor-4:vdsm-0:4.40.50.8-1.el8ev.src",
"8Base-RHV-Hypervisor-4:vdsm-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Hypervisor-4:vdsm-api-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-client-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-common-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Hypervisor-4:vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Hypervisor-4:vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-http-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-network-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Hypervisor-4:vdsm-network-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Hypervisor-4:vdsm-python-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28458"
},
{
"category": "external",
"summary": "RHBZ#1908441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908441"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28458",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28458"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28458",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28458"
},
{
"category": "external",
"summary": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402",
"url": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402"
}
],
"release_date": "2020-10-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T11:41:44+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Agents-4:cockpit-ovirt-0:0.14.20-1.el8ev.src",
"8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.14.20-1.el8ev.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1184"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RHV-Agents-4:cockpit-ovirt-0:0.14.20-1.el8ev.src",
"8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.14.20-1.el8ev.noarch",
"8Base-RHV-Agents-4:ovirt-host-0:4.4.5-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:ovirt-host-0:4.4.5-1.el8ev.src",
"8Base-RHV-Agents-4:ovirt-host-0:4.4.5-1.el8ev.x86_64",
"8Base-RHV-Agents-4:ovirt-host-dependencies-0:4.4.5-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:ovirt-host-dependencies-0:4.4.5-1.el8ev.x86_64",
"8Base-RHV-Agents-4:ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.noarch",
"8Base-RHV-Agents-4:ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.src",
"8Base-RHV-Agents-4:ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.noarch",
"8Base-RHV-Agents-4:ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.src",
"8Base-RHV-Agents-4:v2v-conversion-host-0:1.16.2-10.el8ev.src",
"8Base-RHV-Agents-4:v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch",
"8Base-RHV-Agents-4:v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:vdsm-0:4.40.50.8-1.el8ev.src",
"8Base-RHV-Agents-4:vdsm-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Agents-4:vdsm-api-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-client-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-common-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Agents-4:vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Agents-4:vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-http-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-network-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Agents-4:vdsm-network-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Agents-4:vdsm-python-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Agents-4:vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:v2v-conversion-host-0:1.16.2-10.el8ev.src",
"8Base-RHV-Hypervisor-4:v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch",
"8Base-RHV-Hypervisor-4:v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Hypervisor-4:vdsm-0:4.40.50.8-1.el8ev.src",
"8Base-RHV-Hypervisor-4:vdsm-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Hypervisor-4:vdsm-api-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-client-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-common-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Hypervisor-4:vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Hypervisor-4:vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-http-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-network-0:4.40.50.8-1.el8ev.ppc64le",
"8Base-RHV-Hypervisor-4:vdsm-network-0:4.40.50.8-1.el8ev.x86_64",
"8Base-RHV-Hypervisor-4:vdsm-python-0:4.40.50.8-1.el8ev.noarch",
"8Base-RHV-Hypervisor-4:vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name"
}
]
}
CERTFR-2025-AVI-0563
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Splunk Enterprise | Splunk Enterprise Cloud versions 9.3.2411.x antérieures à 9.3.2411.107 | ||
| Splunk | SOAR | Splunk SOAR versions antérieures à 6.4.1 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.4.x antérieures à 9.4.3 | ||
| Splunk | Universal Forwarder | Splunk Universal Forwarder versions 9.2.x antérieures à 9.2.7 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.3.x antérieures à 9.3.5 | ||
| Splunk | Splunk DB Connect | Splunk DB Connect versions antérieures à 4.0.0 | ||
| Splunk | Universal Forwarder | Splunk Universal Forwarder versions 9.3.x antérieures à 9.3.5 | ||
| Splunk | Universal Forwarder | Splunk Universal Forwarder versions 9.4.x antérieures à 9.4.3 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise Cloud versions 9.3.2408.x antérieures à 9.3.2408.117 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.1.x antérieures à 9.1.10 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.2.x antérieures à 9.2.7 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise Cloud versions 9.2.2406.x antérieures à 9.2.2406.121 | ||
| Splunk | Universal Forwarder | Splunk Universal Forwarder versions 9.1.x antérieures à 9.1.10 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Splunk Enterprise Cloud versions 9.3.2411.x ant\u00e9rieures \u00e0 9.3.2411.107",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk SOAR versions ant\u00e9rieures \u00e0 6.4.1",
"product": {
"name": "SOAR",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.4.x ant\u00e9rieures \u00e0 9.4.3",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Universal Forwarder versions 9.2.x ant\u00e9rieures \u00e0 9.2.7",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.3.x ant\u00e9rieures \u00e0 9.3.5",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk DB Connect versions ant\u00e9rieures \u00e0 4.0.0",
"product": {
"name": "Splunk DB Connect",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Universal Forwarder versions 9.3.x ant\u00e9rieures \u00e0 9.3.5",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Universal Forwarder versions 9.4.x ant\u00e9rieures \u00e0 9.4.3",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise Cloud versions 9.3.2408.x ant\u00e9rieures \u00e0 9.3.2408.117",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.1.x ant\u00e9rieures \u00e0 9.1.10",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.2.x ant\u00e9rieures \u00e0 9.2.7",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise Cloud versions 9.2.2406.x ant\u00e9rieures \u00e0 9.2.2406.121",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Universal Forwarder versions 9.1.x ant\u00e9rieures \u00e0 9.1.10",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2022-30187",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30187"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-2466",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2466"
},
{
"name": "CVE-2025-27414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27414"
},
{
"name": "CVE-2025-20324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20324"
},
{
"name": "CVE-2025-23388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23388"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-20319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20319"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2020-28458",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28458"
},
{
"name": "CVE-2025-20321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20321"
},
{
"name": "CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"name": "CVE-2025-20325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20325"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2025-23387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23387"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2021-23445",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23445"
},
{
"name": "CVE-2024-48949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48949"
},
{
"name": "CVE-2025-23389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23389"
},
{
"name": "CVE-2024-21538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21538"
},
{
"name": "CVE-2022-35583",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35583"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2024-52804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52804"
},
{
"name": "CVE-2025-20300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20300"
},
{
"name": "CVE-2024-45801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45801"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-20323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20323"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-38999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38999"
},
{
"name": "CVE-2025-20320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20320"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-45230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45230"
},
{
"name": "CVE-2024-49767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49767"
},
{
"name": "CVE-2024-47875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47875"
},
{
"name": "CVE-2025-20322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20322"
},
{
"name": "CVE-2024-21272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21272"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2024-39338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39338"
},
{
"name": "CVE-2024-21090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21090"
},
{
"name": "CVE-2013-7489",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7489"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2024-34064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
},
{
"name": "CVE-2024-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
},
{
"name": "CVE-2024-0853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0853"
},
{
"name": "CVE-2025-22952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22952"
},
{
"name": "CVE-2024-32002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32002"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
}
],
"initial_release_date": "2025-07-08T00:00:00",
"last_revision_date": "2025-07-08T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0563",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
"vendor_advisories": [
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0708",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0708"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0703",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0703"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0701",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0701"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0706",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0706"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0705",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0705"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0702",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0702"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0712",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0712"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0711",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0711"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0707",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0707"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0710",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0710"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0709",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0709"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0704",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0704"
}
]
}
CERTFR-2023-AVI-0208
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Tenable. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Nessus versions ant\u00e9rieures \u00e0 10.5.0",
"product": {
"name": "Nessus",
"vendor": {
"name": "Tenable",
"scada": false
}
}
},
{
"description": "Nessus Agent versions 10.3.0 ant\u00e9rieures \u00e0 10.3.2",
"product": {
"name": "Nessus",
"vendor": {
"name": "Tenable",
"scada": false
}
}
},
{
"description": "Nessus Agent versions 8.3.x ant\u00e9rieures \u00e0 8.3.5",
"product": {
"name": "Nessus",
"vendor": {
"name": "Tenable",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2019-11358",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11358"
},
{
"name": "CVE-2020-28458",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28458"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2021-23445",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23445"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2020-7656",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7656"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
}
],
"initial_release_date": "2023-03-10T00:00:00",
"last_revision_date": "2023-03-10T00:00:00",
"links": [],
"reference": "CERTFR-2023-AVI-0208",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-03-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits \u003cspan\nclass=\"textit\"\u003eTenable\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Nessus",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Tenable TNS-2023-11 du 07 mars 2023",
"url": "https://www.tenable.com/security/tns-2023-11"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Tenable TNS-2023-09 du 02 mars 2023",
"url": "https://www.tenable.com/security/tns-2023-09"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Tenable TNS-2023-10 du 06 mars 2023",
"url": "https://www.tenable.com/security/tns-2023-10"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Tenable TNS-2023-12 du 09 mars 2023",
"url": "https://www.tenable.com/security/tns-2023-12"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Tenable TNS-2023-13 du 09 mars 2023",
"url": "https://www.tenable.com/security/tns-2023-13"
}
]
}
CERTFR-2024-AVI-0180
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cognos Analytics | Cognos Analytics versions 11.2.x antérieures à 11.2.4 Fix Pack 3 | ||
| IBM | Cognos Analytics | Cognos Analytics versions 11.1.x antérieures à 11.1.7 Fix Pack 8 | ||
| IBM | AIX | AIX versions 7.2 et 7.3 sans le dernier correctif de sécurité OpenSSH | ||
| IBM | Cognos Analytics | Cognos Analytics versions 12.0.x antérieures à 12.0.2 | ||
| IBM | WebSphere | Websphere Liberty versions antérieures à 23.0.0.12 | ||
| IBM | VIOS | VIOS versions 3.1 et 4.1 sans le dernier correctif de sécurité OpenSSH | ||
| IBM | Cloud Pak | Cognos Dashboards on Cloud Pak for Data versions antérieures à 4.8.3 | ||
| IBM | N/A | Cognos Command Center versions antérieures à 10.2.5 IF1 | ||
| IBM | Cognos Transformer | Cognos Transformer versions antérieures à 11.1.7 Fix Pack 8 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.4 Fix Pack 3",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 11.1.x ant\u00e9rieures \u00e0 11.1.7 Fix Pack 8",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX versions 7.2 et 7.3 sans le dernier correctif de s\u00e9curit\u00e9 OpenSSH",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 12.0.x ant\u00e9rieures \u00e0 12.0.2",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Websphere Liberty versions ant\u00e9rieures \u00e0 23.0.0.12",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VIOS versions 3.1 et 4.1 sans le dernier correctif de s\u00e9curit\u00e9 OpenSSH",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Dashboards on Cloud Pak for Data versions ant\u00e9rieures \u00e0 4.8.3",
"product": {
"name": "Cloud Pak",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Command Center versions ant\u00e9rieures \u00e0 10.2.5 IF1",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Transformer versions ant\u00e9rieures \u00e0 11.1.7 Fix Pack 8",
"product": {
"name": "Cognos Transformer",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2021-44906",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44906"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2023-45857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45857"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2023-46234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46234"
},
{
"name": "CVE-2023-38359",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38359"
},
{
"name": "CVE-2021-3572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3572"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2023-50324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50324"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-45133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45133"
},
{
"name": "CVE-2020-28458",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28458"
},
{
"name": "CVE-2023-26115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26115"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-4160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4160"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2021-43138",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43138"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2023-30589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30589"
},
{
"name": "CVE-2021-23445",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23445"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2022-46364",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46364"
},
{
"name": "CVE-2021-3711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2022-40609",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40609"
},
{
"name": "CVE-2023-32344",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32344"
},
{
"name": "CVE-2023-43051",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43051"
},
{
"name": "CVE-2023-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36478"
},
{
"name": "CVE-2019-1547",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1547"
},
{
"name": "CVE-2023-39410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39410"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2021-23839",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23839"
},
{
"name": "CVE-2023-30588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30588"
},
{
"name": "CVE-2012-5784",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5784"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2021-41035",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41035"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2018-8032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8032"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2021-28167",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28167"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2021-31684",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31684"
},
{
"name": "CVE-2023-46604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46604"
},
{
"name": "CVE-2010-2084",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2084"
},
{
"name": "CVE-2019-0227",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0227"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2023-24998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24998"
},
{
"name": "CVE-2022-34357",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34357"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2023-46158",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46158"
},
{
"name": "CVE-2014-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3596"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"name": "CVE-2023-26136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26136"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2021-23841",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
},
{
"name": "CVE-2021-35560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35560"
},
{
"name": "CVE-2023-51384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51384"
},
{
"name": "CVE-2022-34165",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34165"
},
{
"name": "CVE-2023-30996",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30996"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
}
],
"initial_release_date": "2024-03-01T00:00:00",
"last_revision_date": "2024-03-01T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0180",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-03-01T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une\n\u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7112541 du 23 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7112541"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7125640 du 28 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7125640"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7124466 du 28 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7124466"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7112504 du 28 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7112504"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7125461 du 28 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7125461"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7123154 du 23 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7123154"
}
]
}
CERTFR-2022-AVI-959
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Tenable Nessus. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Nessus versions ant\u00e9rieures \u00e0 10.3.1",
"product": {
"name": "Nessus",
"vendor": {
"name": "Tenable",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-31129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31129"
},
{
"name": "CVE-2020-28458",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28458"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2021-23445",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23445"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2022-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24785"
},
{
"name": "CVE-2022-40674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40674"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
}
],
"initial_release_date": "2022-10-27T00:00:00",
"last_revision_date": "2022-10-27T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-959",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-10-27T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Tenable Nessus.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Tenable Nessus",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2022-20 du 26 octobre 2022",
"url": "https://www.tenable.com/security/tns-2022-20"
}
]
}
CERTFR-2023-AVI-0190
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Tenable Nessus. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Nessus versions ant\u00e9rieures \u00e0 10.5.0",
"product": {
"name": "Nessus",
"vendor": {
"name": "Tenable",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2019-11358",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11358"
},
{
"name": "CVE-2020-28458",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28458"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2021-23445",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23445"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2020-7656",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7656"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
}
],
"initial_release_date": "2023-03-03T00:00:00",
"last_revision_date": "2023-03-03T00:00:00",
"links": [],
"reference": "CERTFR-2023-AVI-0190",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-03-03T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Tenable Nessus.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Tenable Nessus",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2023-09 du 02 mars 2023",
"url": "https://www.tenable.com/security/tns-2023-09"
}
]
}
msrc_cve-2020-28458
Vulnerability from csaf_microsoft
Notes
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2020-28458 All versions of package datatables.net are vulnerable to Prototype Pollution - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2020/msrc_cve-2020-28458.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "All versions of package datatables.net are vulnerable to Prototype Pollution",
"tracking": {
"current_release_date": "2024-11-23T00:00:00.000Z",
"generator": {
"date": "2025-10-19T18:13:45.019Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2020-28458",
"initial_release_date": "2020-12-02T00:00:00.000Z",
"revision_history": [
{
"date": "2024-11-23T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 reaper 3.1.1-18",
"product": {
"name": "\u003ccbl2 reaper 3.1.1-18",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "cbl2 reaper 3.1.1-18",
"product": {
"name": "cbl2 reaper 3.1.1-18",
"product_id": "19820"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 reaper 3.1.1-15",
"product": {
"name": "\u003ccbl2 reaper 3.1.1-15",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "cbl2 reaper 3.1.1-15",
"product": {
"name": "cbl2 reaper 3.1.1-15",
"product_id": "17180"
}
}
],
"category": "product_name",
"name": "reaper"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 reaper 3.1.1-18 as a component of CBL Mariner 2.0",
"product_id": "17086-1"
},
"product_reference": "1",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 reaper 3.1.1-18 as a component of CBL Mariner 2.0",
"product_id": "19820-17086"
},
"product_reference": "19820",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 reaper 3.1.1-15 as a component of CBL Mariner 2.0",
"product_id": "17086-2"
},
"product_reference": "2",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 reaper 3.1.1-15 as a component of CBL Mariner 2.0",
"product_id": "17180-17086"
},
"product_reference": "17180",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-28458",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0026#39;Prototype Pollution\u0026#39;)"
},
"notes": [
{
"category": "general",
"text": "Snyk",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"19820-17086",
"17180-17086"
],
"known_affected": [
"17086-1",
"17086-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-28458 All versions of package datatables.net are vulnerable to Prototype Pollution - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2020/msrc_cve-2020-28458.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-23T00:00:00.000Z",
"details": "3.1.1-15:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-1",
"17086-2"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"environmentalsScore": 0.0,
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.3,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"17086-1",
"17086-2"
]
}
],
"title": "All versions of package datatables.net are vulnerable to Prototype Pollution"
}
]
}
gsd-2020-28458
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2020-28458",
"description": "All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806.",
"id": "GSD-2020-28458",
"references": [
"https://access.redhat.com/errata/RHSA-2021:1186",
"https://access.redhat.com/errata/RHSA-2021:1184",
"https://access.redhat.com/errata/RHSA-2021:1169"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2020-28458"
],
"details": "All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806.",
"id": "GSD-2020-28458",
"modified": "2023-12-13T01:22:01.618347Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "report@snyk.io",
"DATE_PUBLIC": "2020-12-16T10:31:22.782637Z",
"ID": "CVE-2020-28458",
"STATE": "PUBLIC",
"TITLE": "Prototype Pollution"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "datatables.net",
"version": {
"version_data": [
{
"version_affected": "\u003e=",
"version_value": "0"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Alessio Della Libera (d3lla)"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Prototype Pollution"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402",
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402"
},
{
"name": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1051961",
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1051961"
},
{
"name": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1051962",
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1051962"
},
{
"name": "https://github.com/DataTables/Dist-DataTables/blob/master/js/jquery.dataTables.js%23L2766",
"refsource": "MISC",
"url": "https://github.com/DataTables/Dist-DataTables/blob/master/js/jquery.dataTables.js%23L2766"
},
{
"name": "https://github.com/DataTables/DataTablesSrc/commit/a51cbe99fd3d02aa5582f97d4af1615d11a1ea03",
"refsource": "MISC",
"url": "https://github.com/DataTables/DataTablesSrc/commit/a51cbe99fd3d02aa5582f97d4af1615d11a1ea03"
},
{
"name": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806",
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003c1.10.22",
"affected_versions": "All versions before 1.10.22",
"cvss_v2": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"cwe_ids": [
"CWE-1035",
"CWE-20",
"CWE-937"
],
"date": "2021-07-21",
"description": "`datatables.net` is vulnerable to Prototype Pollution due to an incomplete fix",
"fixed_versions": [
"1.10.22"
],
"identifier": "CVE-2020-28458",
"identifiers": [
"CVE-2020-28458"
],
"not_impacted": "All versions starting from 1.10.22",
"package_slug": "npm/datatables.net",
"pubdate": "2020-12-16",
"solution": "Upgrade to version 1.10.22 or above.",
"title": "Improper Input Validation",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2020-28458"
],
"uuid": "1e43cde1-ae0a-4dab-9880-8d06b903d386"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:datatables:datatables.net:*:*:*:*:*:node.js:*:*",
"cpe_name": [],
"versionEndExcluding": "1.10.23",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "report@snyk.io",
"ID": "CVE-2020-28458"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-1321"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/DataTables/Dist-DataTables/blob/master/js/jquery.dataTables.js%23L2766",
"refsource": "MISC",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "https://github.com/DataTables/Dist-DataTables/blob/master/js/jquery.dataTables.js%23L2766"
},
{
"name": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1051961",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1051961"
},
{
"name": "https://github.com/DataTables/DataTablesSrc/commit/a51cbe99fd3d02aa5582f97d4af1615d11a1ea03",
"refsource": "MISC",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/DataTables/DataTablesSrc/commit/a51cbe99fd3d02aa5582f97d4af1615d11a1ea03"
},
{
"name": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402"
},
{
"name": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1051962",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1051962"
},
{
"name": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806",
"refsource": "MISC",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
},
"lastModifiedDate": "2022-08-15T15:51Z",
"publishedDate": "2020-12-16T11:15Z"
}
}
}
ghsa-m7j4-fhg6-xf5v
Vulnerability from github
All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806.
{
"affected": [
{
"package": {
"ecosystem": "npm",
"name": "datatables.net"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.10.22"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2020-28458"
],
"database_specific": {
"cwe_ids": [
"CWE-1321"
],
"github_reviewed": true,
"github_reviewed_at": "2020-12-17T18:27:07Z",
"nvd_published_at": "2020-12-16T11:15:00Z",
"severity": "HIGH"
},
"details": "All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806.",
"id": "GHSA-m7j4-fhg6-xf5v",
"modified": "2024-06-21T21:33:49Z",
"published": "2020-12-17T21:00:50Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28458"
},
{
"type": "WEB",
"url": "https://github.com/DataTables/DataTablesSrc/commit/a51cbe99fd3d02aa5582f97d4af1615d11a1ea03"
},
{
"type": "PACKAGE",
"url": "https://github.com/DataTables/DataTablesSrc"
},
{
"type": "WEB",
"url": "https://github.com/DataTables/Dist-DataTables/blob/master/js/jquery.dataTables.js%23L2766"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20240621-0006"
},
{
"type": "WEB",
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1051961"
},
{
"type": "WEB",
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1051962"
},
{
"type": "WEB",
"url": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402"
},
{
"type": "WEB",
"url": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"type": "CVSS_V3"
}
],
"summary": "datatables.net vulnerable to Prototype Pollution due to incomplete fix"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.