Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2020-28458
Vulnerability from cvelistv5
Published
2020-12-16 10:35
Modified
2024-09-16 23:22
Severity ?
EPSS score ?
Summary
All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | datatables.net |
Version: 0 < unspecified |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:40:58.714Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402" }, { "tags": [ "x_transferred" ], "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1051961" }, { "tags": [ "x_transferred" ], "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1051962" }, { "tags": [ "x_transferred" ], "url": "https://github.com/DataTables/Dist-DataTables/blob/master/js/jquery.dataTables.js%23L2766" }, { "tags": [ "x_transferred" ], "url": "https://github.com/DataTables/DataTablesSrc/commit/a51cbe99fd3d02aa5582f97d4af1615d11a1ea03" }, { "tags": [ "x_transferred" ], "url": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20240621-0006/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "datatables.net", "vendor": "n/a", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Alessio Della Libera (d3lla)" } ], "datePublic": "2020-12-16T00:00:00", "descriptions": [ { "lang": "en", "value": "All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Prototype Pollution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-21T19:07:12.415586", "orgId": "bae035ff-b466-4ff4-94d0-fc9efd9e1730", "shortName": "snyk" }, "references": [ { "url": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402" }, { "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1051961" }, { "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1051962" }, { "url": "https://github.com/DataTables/Dist-DataTables/blob/master/js/jquery.dataTables.js%23L2766" }, { "url": "https://github.com/DataTables/DataTablesSrc/commit/a51cbe99fd3d02aa5582f97d4af1615d11a1ea03" }, { "url": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806" }, { "url": "https://security.netapp.com/advisory/ntap-20240621-0006/" } ], "title": "Prototype Pollution" } }, "cveMetadata": { "assignerOrgId": "bae035ff-b466-4ff4-94d0-fc9efd9e1730", "assignerShortName": "snyk", "cveId": "CVE-2020-28458", "datePublished": "2020-12-16T10:35:20.456264Z", "dateReserved": "2020-11-12T00:00:00", "dateUpdated": "2024-09-16T23:22:14.200Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-28458\",\"sourceIdentifier\":\"report@snyk.io\",\"published\":\"2020-12-16T11:15:12.130\",\"lastModified\":\"2024-11-21T05:22:50.460\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806.\"},{\"lang\":\"es\",\"value\":\"Todas las versiones del paquete datatables.net son vulnerables a una contaminaci\u00f3n de prototipos debido a una correcci\u00f3n incompleta para https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"report@snyk.io\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L\",\"baseScore\":7.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":3.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L\",\"baseScore\":7.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":3.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1321\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:datatables:datatables.net:*:*:*:*:*:node.js:*:*\",\"versionEndExcluding\":\"1.10.23\",\"matchCriteriaId\":\"E9C31498-D6FB-4A18-86D6-10D48577C6EF\"}]}]}],\"references\":[{\"url\":\"https://github.com/DataTables/DataTablesSrc/commit/a51cbe99fd3d02aa5582f97d4af1615d11a1ea03\",\"source\":\"report@snyk.io\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/DataTables/Dist-DataTables/blob/master/js/jquery.dataTables.js%23L2766\",\"source\":\"report@snyk.io\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240621-0006/\",\"source\":\"report@snyk.io\"},{\"url\":\"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1051961\",\"source\":\"report@snyk.io\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1051962\",\"source\":\"report@snyk.io\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402\",\"source\":\"report@snyk.io\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806\",\"source\":\"report@snyk.io\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/DataTables/DataTablesSrc/commit/a51cbe99fd3d02aa5582f97d4af1615d11a1ea03\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/DataTables/Dist-DataTables/blob/master/js/jquery.dataTables.js%23L2766\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240621-0006/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1051961\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1051962\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]}]}}" } }
rhsa-2021_1184
Vulnerability from csaf_redhat
Published
2021-04-14 11:41
Modified
2024-11-22 16:21
Summary
Red Hat Security Advisory: RHV RHEL Host (ovirt-host) 4.4.z [ovirt-4.4.5] security, bug fix, enhancement
Notes
Topic
Updated host packages that fix several bugs and add various enhancements are now available.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The ovirt-hosted-engine-setup package provides a self-hosted engine tool for the Red Hat Virtualization Manager. A self-hosted engine is a virtualized environment in which the Manager runs on a virtual machine on the hosts managed by the Manager.
Bug Fix(es):
* In this release, it is now possible to enter a path to the OVA archive for local appliance installation using the cockpit-ovirt UI. (BZ#1755156)
* Previously, following a successful migration on the Self-hosted Engine, he HA agent on the source host immediately moved to the state EngineDown, and shorly thereafter tried to start the engine locally, if the destination host didn't update the shared storage quickly enough, marking the Manager virtual machine as being up.
As a result, starting the virtual machine failed due to a shared lock held by the destination host. This also resulted in generating false alarms and notifications.
In this release, the HA agent first moves to the state EngineMaybeAway, providing the destination host more time to update the shared storage with the updated state. As a result, no notifications or false alarms are generated.
Note: in scenarios where the virtual machine needs to be started on the source host, this fix slightly increases the time it takes the Manager virtual
machine on the source host to start. (BZ#1815589)
* Previously, if a host in the Self-hosted Engine had an ID number higher than 64, other hosts did not recognize that host, and the host did not appear in 'hosted-engine --vm-status'.
In this release, the Self-hosted Engine allows host ID numbers of up to 2000. (BZ#1916032)
* ovirt-hosted-engine-setup now requires ansible-2.9.17. (BZ#1921108)
* Previously the logical names for disks without a mounted filesystem were not displayed in the Red Hat Virtualization Manager.
In this release, logical names for such disks are properly reported provided the version of QEMU Guest Agent in the virtual machine is 5.2 or higher. (BZ#1836661)
* Previously, if the Seal option was used when creating a template for Linux virtual machines, the original host name was not removed from the template.
In this release, the host name is set to localhost or the new virtual machine host name. (BZ#1860492)
* Previously, the used memory of the host didn't take the SReclaimable memory into consideration while it did for free memory. As a result, there were discrepancies in the host statistics.
In this release, the SReclaimable memory is a part of the used memory calculation. (BZ#1916519)
Security Fix(es):
* datatables.net: prototype pollution if 'constructor' were used in a data property name (CVE-2020-28458)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated host packages that fix several bugs and add various enhancements are now available.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The ovirt-hosted-engine-setup package provides a self-hosted engine tool for the Red Hat Virtualization Manager. A self-hosted engine is a virtualized environment in which the Manager runs on a virtual machine on the hosts managed by the Manager.\nBug Fix(es):\n\n* In this release, it is now possible to enter a path to the OVA archive for local appliance installation using the cockpit-ovirt UI. (BZ#1755156)\n\n* Previously, following a successful migration on the Self-hosted Engine, he HA agent on the source host immediately moved to the state EngineDown, and shorly thereafter tried to start the engine locally, if the destination host didn\u0027t update the shared storage quickly enough, marking the Manager virtual machine as being up.\nAs a result, starting the virtual machine failed due to a shared lock held by the destination host. This also resulted in generating false alarms and notifications.\nIn this release, the HA agent first moves to the state EngineMaybeAway, providing the destination host more time to update the shared storage with the updated state. As a result, no notifications or false alarms are generated. \nNote: in scenarios where the virtual machine needs to be started on the source host, this fix slightly increases the time it takes the Manager virtual\nmachine on the source host to start. (BZ#1815589)\n\n* Previously, if a host in the Self-hosted Engine had an ID number higher than 64, other hosts did not recognize that host, and the host did not appear in \u0027hosted-engine --vm-status\u0027.\nIn this release, the Self-hosted Engine allows host ID numbers of up to 2000. (BZ#1916032)\n\n* ovirt-hosted-engine-setup now requires ansible-2.9.17. (BZ#1921108)\n\n* Previously the logical names for disks without a mounted filesystem were not displayed in the Red Hat Virtualization Manager. \nIn this release, logical names for such disks are properly reported provided the version of QEMU Guest Agent in the virtual machine is 5.2 or higher. (BZ#1836661)\n\n* Previously, if the Seal option was used when creating a template for Linux virtual machines, the original host name was not removed from the template. \nIn this release, the host name is set to localhost or the new virtual machine host name. (BZ#1860492)\n\n* Previously, the used memory of the host didn\u0027t take the SReclaimable memory into consideration while it did for free memory. As a result, there were discrepancies in the host statistics. \nIn this release, the SReclaimable memory is a part of the used memory calculation. (BZ#1916519)\n\nSecurity Fix(es):\n\n* datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name (CVE-2020-28458)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:1184", "url": "https://access.redhat.com/errata/RHSA-2021:1184" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1755156", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755156" }, { "category": "external", "summary": "1796415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796415" }, { "category": "external", "summary": "1815589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815589" }, { "category": "external", "summary": "1836661", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1836661" }, { "category": "external", "summary": "1860492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860492" }, { "category": "external", "summary": "1870435", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1870435" }, { "category": "external", "summary": "1901503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901503" }, { "category": "external", "summary": "1908441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908441" }, { "category": "external", "summary": "1909956", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1909956" }, { "category": "external", "summary": "1916032", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1916032" }, { "category": "external", "summary": "1916519", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1916519" }, { "category": "external", "summary": "1916947", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1916947" }, { "category": "external", "summary": "1917927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917927" }, { "category": "external", "summary": "1919246", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919246" }, { "category": "external", "summary": "1921014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921014" }, { "category": "external", "summary": "1921108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921108" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1184.json" } ], "title": "Red Hat Security Advisory: RHV RHEL Host (ovirt-host) 4.4.z [ovirt-4.4.5] security, bug fix, enhancement", "tracking": { "current_release_date": "2024-11-22T16:21:06+00:00", "generator": { "date": "2024-11-22T16:21:06+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:1184", "initial_release_date": "2021-04-14T11:41:44+00:00", "revision_history": [ { "date": "2021-04-14T11:41:44+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-04-14T11:41:44+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T16:21:06+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product": { "name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8" } } }, { "category": "product_name", "name": "Red Hat Virtualization 4 Hypervisor for RHEL 8", "product": { "name": "Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "v2v-conversion-host-0:1.16.2-10.el8ev.src", "product": { "name": "v2v-conversion-host-0:1.16.2-10.el8ev.src", "product_id": "v2v-conversion-host-0:1.16.2-10.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/v2v-conversion-host@1.16.2-10.el8ev?arch=src" } } }, { "category": "product_version", "name": "ovirt-host-0:4.4.5-1.el8ev.src", "product": { "name": "ovirt-host-0:4.4.5-1.el8ev.src", "product_id": "ovirt-host-0:4.4.5-1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-host@4.4.5-1.el8ev?arch=src" } } }, { "category": "product_version", "name": "ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.src", "product": { "name": "ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.src", "product_id": "ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-hosted-engine-setup@2.4.9-4.el8ev?arch=src" } } }, { "category": "product_version", "name": "ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.src", "product": { "name": "ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.src", "product_id": "ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-hosted-engine-ha@2.4.6-1.el8ev?arch=src" } } }, { "category": "product_version", "name": "cockpit-ovirt-0:0.14.20-1.el8ev.src", "product": { "name": "cockpit-ovirt-0:0.14.20-1.el8ev.src", "product_id": "cockpit-ovirt-0:0.14.20-1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cockpit-ovirt@0.14.20-1.el8ev?arch=src" } } }, { "category": "product_version", "name": "vdsm-0:4.40.50.8-1.el8ev.src", "product": { "name": "vdsm-0:4.40.50.8-1.el8ev.src", "product_id": "vdsm-0:4.40.50.8-1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm@4.40.50.8-1.el8ev?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch", "product": { "name": "v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch", "product_id": "v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/v2v-conversion-host-wrapper@1.16.2-10.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch", "product": { "name": "v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch", "product_id": "v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/v2v-conversion-host-ansible@1.16.2-10.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.noarch", "product": { "name": "ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.noarch", "product_id": "ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-hosted-engine-setup@2.4.9-4.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.noarch", "product": { "name": "ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.noarch", "product_id": "ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-hosted-engine-ha@2.4.6-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "cockpit-ovirt-dashboard-0:0.14.20-1.el8ev.noarch", "product": { "name": "cockpit-ovirt-dashboard-0:0.14.20-1.el8ev.noarch", "product_id": "cockpit-ovirt-dashboard-0:0.14.20-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/cockpit-ovirt-dashboard@0.14.20-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-api-0:4.40.50.8-1.el8ev.noarch", "product": { "name": "vdsm-api-0:4.40.50.8-1.el8ev.noarch", "product_id": "vdsm-api-0:4.40.50.8-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-api@4.40.50.8-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-client-0:4.40.50.8-1.el8ev.noarch", "product": { "name": "vdsm-client-0:4.40.50.8-1.el8ev.noarch", "product_id": "vdsm-client-0:4.40.50.8-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-client@4.40.50.8-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-common-0:4.40.50.8-1.el8ev.noarch", "product": { "name": "vdsm-common-0:4.40.50.8-1.el8ev.noarch", "product_id": "vdsm-common-0:4.40.50.8-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-common@4.40.50.8-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch", "product": { "name": "vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch", "product_id": "vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-cpuflags@4.40.50.8-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch", "product": { "name": "vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch", "product_id": "vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-ethtool-options@4.40.50.8-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch", "product": { "name": "vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch", "product_id": "vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-fcoe@4.40.50.8-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch", "product": { "name": "vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch", "product_id": "vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-localdisk@4.40.50.8-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch", "product": { "name": "vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch", "product_id": "vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-nestedvt@4.40.50.8-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch", "product": { "name": "vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch", "product_id": "vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-openstacknet@4.40.50.8-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch", "product": { "name": "vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch", "product_id": "vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-vhostmd@4.40.50.8-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch", "product": { "name": "vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch", "product_id": "vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-vmfex-dev@4.40.50.8-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-http-0:4.40.50.8-1.el8ev.noarch", "product": { "name": "vdsm-http-0:4.40.50.8-1.el8ev.noarch", "product_id": "vdsm-http-0:4.40.50.8-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-http@4.40.50.8-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch", "product": { "name": "vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch", "product_id": "vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-jsonrpc@4.40.50.8-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-python-0:4.40.50.8-1.el8ev.noarch", "product": { "name": "vdsm-python-0:4.40.50.8-1.el8ev.noarch", "product_id": "vdsm-python-0:4.40.50.8-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-python@4.40.50.8-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch", "product": { "name": "vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch", "product_id": "vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-yajsonrpc@4.40.50.8-1.el8ev?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "ovirt-host-0:4.4.5-1.el8ev.x86_64", "product": { "name": "ovirt-host-0:4.4.5-1.el8ev.x86_64", "product_id": "ovirt-host-0:4.4.5-1.el8ev.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-host@4.4.5-1.el8ev?arch=x86_64" } } }, { "category": "product_version", "name": "ovirt-host-dependencies-0:4.4.5-1.el8ev.x86_64", "product": { "name": "ovirt-host-dependencies-0:4.4.5-1.el8ev.x86_64", "product_id": "ovirt-host-dependencies-0:4.4.5-1.el8ev.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-host-dependencies@4.4.5-1.el8ev?arch=x86_64" } } }, { "category": "product_version", "name": "vdsm-0:4.40.50.8-1.el8ev.x86_64", "product": { "name": "vdsm-0:4.40.50.8-1.el8ev.x86_64", "product_id": "vdsm-0:4.40.50.8-1.el8ev.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm@4.40.50.8-1.el8ev?arch=x86_64" } } }, { "category": "product_version", "name": "vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64", "product": { "name": "vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64", "product_id": "vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-gluster@4.40.50.8-1.el8ev?arch=x86_64" } } }, { "category": "product_version", "name": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64", "product": { "name": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64", "product_id": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-checkips@4.40.50.8-1.el8ev?arch=x86_64" } } }, { "category": "product_version", "name": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64", "product": { "name": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64", "product_id": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-extra-ipv4-addrs@4.40.50.8-1.el8ev?arch=x86_64" } } }, { "category": "product_version", "name": "vdsm-network-0:4.40.50.8-1.el8ev.x86_64", "product": { "name": "vdsm-network-0:4.40.50.8-1.el8ev.x86_64", "product_id": "vdsm-network-0:4.40.50.8-1.el8ev.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-network@4.40.50.8-1.el8ev?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "ovirt-host-0:4.4.5-1.el8ev.ppc64le", "product": { "name": "ovirt-host-0:4.4.5-1.el8ev.ppc64le", "product_id": "ovirt-host-0:4.4.5-1.el8ev.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-host@4.4.5-1.el8ev?arch=ppc64le" } } }, { "category": "product_version", "name": "ovirt-host-dependencies-0:4.4.5-1.el8ev.ppc64le", "product": { "name": "ovirt-host-dependencies-0:4.4.5-1.el8ev.ppc64le", "product_id": "ovirt-host-dependencies-0:4.4.5-1.el8ev.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-host-dependencies@4.4.5-1.el8ev?arch=ppc64le" } } }, { "category": "product_version", "name": "vdsm-0:4.40.50.8-1.el8ev.ppc64le", "product": { "name": "vdsm-0:4.40.50.8-1.el8ev.ppc64le", "product_id": "vdsm-0:4.40.50.8-1.el8ev.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm@4.40.50.8-1.el8ev?arch=ppc64le" } } }, { "category": "product_version", "name": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le", "product": { "name": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le", "product_id": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-checkips@4.40.50.8-1.el8ev?arch=ppc64le" } } }, { "category": "product_version", "name": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le", "product": { "name": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le", "product_id": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-extra-ipv4-addrs@4.40.50.8-1.el8ev?arch=ppc64le" } } }, { "category": "product_version", "name": "vdsm-network-0:4.40.50.8-1.el8ev.ppc64le", "product": { "name": "vdsm-network-0:4.40.50.8-1.el8ev.ppc64le", "product_id": "vdsm-network-0:4.40.50.8-1.el8ev.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-network@4.40.50.8-1.el8ev?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cockpit-ovirt-0:0.14.20-1.el8ev.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:cockpit-ovirt-0:0.14.20-1.el8ev.src" }, "product_reference": "cockpit-ovirt-0:0.14.20-1.el8ev.src", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-ovirt-dashboard-0:0.14.20-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.14.20-1.el8ev.noarch" }, "product_reference": "cockpit-ovirt-dashboard-0:0.14.20-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-host-0:4.4.5-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:ovirt-host-0:4.4.5-1.el8ev.ppc64le" }, "product_reference": "ovirt-host-0:4.4.5-1.el8ev.ppc64le", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-host-0:4.4.5-1.el8ev.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:ovirt-host-0:4.4.5-1.el8ev.src" }, "product_reference": "ovirt-host-0:4.4.5-1.el8ev.src", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-host-0:4.4.5-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:ovirt-host-0:4.4.5-1.el8ev.x86_64" }, "product_reference": "ovirt-host-0:4.4.5-1.el8ev.x86_64", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-host-dependencies-0:4.4.5-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:ovirt-host-dependencies-0:4.4.5-1.el8ev.ppc64le" }, "product_reference": "ovirt-host-dependencies-0:4.4.5-1.el8ev.ppc64le", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-host-dependencies-0:4.4.5-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:ovirt-host-dependencies-0:4.4.5-1.el8ev.x86_64" }, "product_reference": "ovirt-host-dependencies-0:4.4.5-1.el8ev.x86_64", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.noarch" }, "product_reference": "ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.src" }, "product_reference": "ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.src", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.noarch" }, "product_reference": "ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.src" }, "product_reference": "ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.src", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "v2v-conversion-host-0:1.16.2-10.el8ev.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:v2v-conversion-host-0:1.16.2-10.el8ev.src" }, "product_reference": "v2v-conversion-host-0:1.16.2-10.el8ev.src", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch" }, "product_reference": "v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch" }, "product_reference": "v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-0:4.40.50.8-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-0:4.40.50.8-1.el8ev.ppc64le" }, "product_reference": "vdsm-0:4.40.50.8-1.el8ev.ppc64le", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-0:4.40.50.8-1.el8ev.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-0:4.40.50.8-1.el8ev.src" }, "product_reference": "vdsm-0:4.40.50.8-1.el8ev.src", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-0:4.40.50.8-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-0:4.40.50.8-1.el8ev.x86_64" }, "product_reference": "vdsm-0:4.40.50.8-1.el8ev.x86_64", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-api-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-api-0:4.40.50.8-1.el8ev.noarch" }, "product_reference": "vdsm-api-0:4.40.50.8-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-client-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-client-0:4.40.50.8-1.el8ev.noarch" }, "product_reference": "vdsm-client-0:4.40.50.8-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-common-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-common-0:4.40.50.8-1.el8ev.noarch" }, "product_reference": "vdsm-common-0:4.40.50.8-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64" }, "product_reference": "vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le" }, "product_reference": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64" }, "product_reference": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch" }, "product_reference": "vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch" }, "product_reference": "vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le" }, "product_reference": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64" }, "product_reference": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch" }, "product_reference": "vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch" }, "product_reference": "vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch" }, "product_reference": "vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch" }, "product_reference": "vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch" }, "product_reference": "vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch" }, "product_reference": "vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-http-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-http-0:4.40.50.8-1.el8ev.noarch" }, "product_reference": "vdsm-http-0:4.40.50.8-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch" }, "product_reference": "vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-network-0:4.40.50.8-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-network-0:4.40.50.8-1.el8ev.ppc64le" }, "product_reference": "vdsm-network-0:4.40.50.8-1.el8ev.ppc64le", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-network-0:4.40.50.8-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-network-0:4.40.50.8-1.el8ev.x86_64" }, "product_reference": "vdsm-network-0:4.40.50.8-1.el8ev.x86_64", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-python-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-python-0:4.40.50.8-1.el8ev.noarch" }, "product_reference": "vdsm-python-0:4.40.50.8-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch" }, "product_reference": "vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "v2v-conversion-host-0:1.16.2-10.el8ev.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:v2v-conversion-host-0:1.16.2-10.el8ev.src" }, "product_reference": "v2v-conversion-host-0:1.16.2-10.el8ev.src", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch" }, "product_reference": "v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch" }, "product_reference": "v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-0:4.40.50.8-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-0:4.40.50.8-1.el8ev.ppc64le" }, "product_reference": "vdsm-0:4.40.50.8-1.el8ev.ppc64le", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-0:4.40.50.8-1.el8ev.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-0:4.40.50.8-1.el8ev.src" }, "product_reference": "vdsm-0:4.40.50.8-1.el8ev.src", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-0:4.40.50.8-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-0:4.40.50.8-1.el8ev.x86_64" }, "product_reference": "vdsm-0:4.40.50.8-1.el8ev.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-api-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-api-0:4.40.50.8-1.el8ev.noarch" }, "product_reference": "vdsm-api-0:4.40.50.8-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-client-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-client-0:4.40.50.8-1.el8ev.noarch" }, "product_reference": "vdsm-client-0:4.40.50.8-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-common-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-common-0:4.40.50.8-1.el8ev.noarch" }, "product_reference": "vdsm-common-0:4.40.50.8-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64" }, "product_reference": "vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le" }, "product_reference": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64" }, "product_reference": "vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch" }, "product_reference": "vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch" }, "product_reference": "vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le" }, "product_reference": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64" }, "product_reference": "vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch" }, "product_reference": "vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch" }, "product_reference": "vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch" }, "product_reference": "vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch" }, "product_reference": "vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch" }, "product_reference": "vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch" }, "product_reference": "vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-http-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-http-0:4.40.50.8-1.el8ev.noarch" }, "product_reference": "vdsm-http-0:4.40.50.8-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch" }, "product_reference": "vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-network-0:4.40.50.8-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-network-0:4.40.50.8-1.el8ev.ppc64le" }, "product_reference": "vdsm-network-0:4.40.50.8-1.el8ev.ppc64le", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-network-0:4.40.50.8-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-network-0:4.40.50.8-1.el8ev.x86_64" }, "product_reference": "vdsm-network-0:4.40.50.8-1.el8ev.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-python-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-python-0:4.40.50.8-1.el8ev.noarch" }, "product_reference": "vdsm-python-0:4.40.50.8-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch" }, "product_reference": "vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-28458", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-12-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHV-Agents-4:ovirt-host-0:4.4.5-1.el8ev.ppc64le", "8Base-RHV-Agents-4:ovirt-host-0:4.4.5-1.el8ev.src", "8Base-RHV-Agents-4:ovirt-host-0:4.4.5-1.el8ev.x86_64", "8Base-RHV-Agents-4:ovirt-host-dependencies-0:4.4.5-1.el8ev.ppc64le", "8Base-RHV-Agents-4:ovirt-host-dependencies-0:4.4.5-1.el8ev.x86_64", "8Base-RHV-Agents-4:ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.noarch", "8Base-RHV-Agents-4:ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.src", "8Base-RHV-Agents-4:ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.noarch", "8Base-RHV-Agents-4:ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.src", "8Base-RHV-Agents-4:v2v-conversion-host-0:1.16.2-10.el8ev.src", "8Base-RHV-Agents-4:v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch", "8Base-RHV-Agents-4:v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-0:4.40.50.8-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-0:4.40.50.8-1.el8ev.src", "8Base-RHV-Agents-4:vdsm-0:4.40.50.8-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-api-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-client-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-common-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-http-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-network-0:4.40.50.8-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-network-0:4.40.50.8-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-python-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:v2v-conversion-host-0:1.16.2-10.el8ev.src", "8Base-RHV-Hypervisor-4:v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch", "8Base-RHV-Hypervisor-4:v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-0:4.40.50.8-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-0:4.40.50.8-1.el8ev.src", "8Base-RHV-Hypervisor-4:vdsm-0:4.40.50.8-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-api-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-client-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-common-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-http-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-network-0:4.40.50.8-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-network-0:4.40.50.8-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-python-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1908441" } ], "notes": [ { "category": "description", "text": "All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806.", "title": "Vulnerability description" }, { "category": "summary", "text": "datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift console container does package a vulnerable version of datatables.net, however as access to the vulnerable component is restricted via OpenShift OAuth the vulnerability is rated with an impact of `Low`.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHV-Agents-4:cockpit-ovirt-0:0.14.20-1.el8ev.src", "8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.14.20-1.el8ev.noarch" ], "known_not_affected": [ "8Base-RHV-Agents-4:ovirt-host-0:4.4.5-1.el8ev.ppc64le", "8Base-RHV-Agents-4:ovirt-host-0:4.4.5-1.el8ev.src", "8Base-RHV-Agents-4:ovirt-host-0:4.4.5-1.el8ev.x86_64", "8Base-RHV-Agents-4:ovirt-host-dependencies-0:4.4.5-1.el8ev.ppc64le", "8Base-RHV-Agents-4:ovirt-host-dependencies-0:4.4.5-1.el8ev.x86_64", "8Base-RHV-Agents-4:ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.noarch", "8Base-RHV-Agents-4:ovirt-hosted-engine-ha-0:2.4.6-1.el8ev.src", "8Base-RHV-Agents-4:ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.noarch", "8Base-RHV-Agents-4:ovirt-hosted-engine-setup-0:2.4.9-4.el8ev.src", "8Base-RHV-Agents-4:v2v-conversion-host-0:1.16.2-10.el8ev.src", "8Base-RHV-Agents-4:v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch", "8Base-RHV-Agents-4:v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-0:4.40.50.8-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-0:4.40.50.8-1.el8ev.src", "8Base-RHV-Agents-4:vdsm-0:4.40.50.8-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-api-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-client-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-common-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-http-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-network-0:4.40.50.8-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-network-0:4.40.50.8-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-python-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:v2v-conversion-host-0:1.16.2-10.el8ev.src", "8Base-RHV-Hypervisor-4:v2v-conversion-host-ansible-0:1.16.2-10.el8ev.noarch", "8Base-RHV-Hypervisor-4:v2v-conversion-host-wrapper-0:1.16.2-10.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-0:4.40.50.8-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-0:4.40.50.8-1.el8ev.src", "8Base-RHV-Hypervisor-4:vdsm-0:4.40.50.8-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-api-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-client-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-common-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-gluster-0:4.40.50.8-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.40.50.8-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-hook-cpuflags-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-ethtool-options-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.40.50.8-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-hook-fcoe-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-localdisk-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-nestedvt-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-openstacknet-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-vhostmd-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-vmfex-dev-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-http-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-jsonrpc-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-network-0:4.40.50.8-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-network-0:4.40.50.8-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-python-0:4.40.50.8-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-yajsonrpc-0:4.40.50.8-1.el8ev.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28458" }, { "category": "external", "summary": "RHBZ#1908441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908441" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28458", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28458" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28458", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28458" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402", "url": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402" } ], "release_date": "2020-10-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-14T11:41:44+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "8Base-RHV-Agents-4:cockpit-ovirt-0:0.14.20-1.el8ev.src", "8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.14.20-1.el8ev.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1184" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-RHV-Agents-4:cockpit-ovirt-0:0.14.20-1.el8ev.src", "8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.14.20-1.el8ev.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name" } ] }
rhsa-2021_1169
Vulnerability from csaf_redhat
Published
2021-04-14 16:34
Modified
2024-11-26 06:32
Summary
Red Hat Security Advisory: RHV Manager (ovirt-engine) 4.4.z [ovirt-4.4.5] security, bug fix, enhancement
Notes
Topic
An update is now available for Red Hat Virtualization Engine 4.4.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The ovirt-engine package provides the manager for virtualization environments.
This manager enables admins to define hosts and networks, as well as to add
storage, create VMs and manage user permissions.
A list of bugs fixed in this update is available in the Technical Notes
book:
https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes
Security Fix(es):
* nodejs-bootstrap-select: not escaping title values on <option> may lead to XSS (CVE-2019-20921)
* m2crypto: bleichenbacher timing attacks in the RSA decryption API (CVE-2020-25657)
* datatables.net: prototype pollution if 'constructor' were used in a data property name (CVE-2020-28458)
* nodejs-immer: prototype pollution may lead to DoS or remote code execution (CVE-2020-28477)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat Virtualization Engine 4.4.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The ovirt-engine package provides the manager for virtualization environments.\nThis manager enables admins to define hosts and networks, as well as to add\nstorage, create VMs and manage user permissions.\n\nA list of bugs fixed in this update is available in the Technical Notes\nbook:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes\n\nSecurity Fix(es):\n\n* nodejs-bootstrap-select: not escaping title values on \u003coption\u003e may lead to XSS (CVE-2019-20921)\n\n* m2crypto: bleichenbacher timing attacks in the RSA decryption API (CVE-2020-25657)\n\n* datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name (CVE-2020-28458)\n\n* nodejs-immer: prototype pollution may lead to DoS or remote code execution (CVE-2020-28477)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:1169", "url": "https://access.redhat.com/errata/RHSA-2021:1169" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes", "url": "https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes" }, { "category": "external", "summary": "1145658", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1145658" }, { "category": "external", "summary": "1155275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1155275" }, { "category": "external", "summary": "1649479", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1649479" }, { "category": "external", "summary": "1666786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666786" }, { "category": "external", "summary": "1688186", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1688186" }, { "category": "external", "summary": "1729359", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1729359" }, { "category": "external", "summary": "1787235", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1787235" }, { "category": "external", "summary": "1802844", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802844" }, { "category": "external", "summary": "1837221", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1837221" }, { "category": "external", "summary": "1843882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1843882" }, { "category": "external", "summary": "1858420", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1858420" }, { "category": "external", "summary": "1882273", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882273" }, { "category": "external", "summary": "1884233", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1884233" }, { "category": "external", "summary": "1889823", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889823" }, { "category": "external", "summary": "1895217", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895217" }, { "category": "external", "summary": "1901503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901503" }, { "category": "external", "summary": "1901752", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901752" }, { "category": "external", "summary": "1905108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905108" }, { "category": "external", "summary": "1905158", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905158" }, { "category": "external", "summary": "1908441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908441" }, { "category": "external", "summary": "1910302", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1910302" }, { "category": "external", "summary": "1913198", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913198" }, { "category": "external", "summary": "1914602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1914602" }, { "category": "external", "summary": "1918162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918162" }, { "category": "external", "summary": "1919555", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919555" }, { "category": "external", "summary": "1921104", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921104" }, { "category": "external", "summary": "1921119", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921119" }, { "category": "external", "summary": "1922200", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922200" }, { "category": "external", "summary": "1924012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1924012" }, { "category": "external", "summary": "1926854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1926854" }, { "category": "external", "summary": "1927851", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927851" }, { "category": "external", "summary": "1931514", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1931514" }, { "category": "external", "summary": "1931786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1931786" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1169.json" } ], "title": "Red Hat Security Advisory: RHV Manager (ovirt-engine) 4.4.z [ovirt-4.4.5] security, bug fix, enhancement", "tracking": { "current_release_date": "2024-11-26T06:32:59+00:00", "generator": { "date": "2024-11-26T06:32:59+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:1169", "initial_release_date": "2021-04-14T16:34:39+00:00", "revision_history": [ { "date": "2021-04-14T16:34:39+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-04-14T16:34:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-26T06:32:59+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product": { "name": "RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhev_manager:4.4:el8" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "apache-sshd-0:2.6.0-1.el8ev.src", "product": { "name": "apache-sshd-0:2.6.0-1.el8ev.src", "product_id": "apache-sshd-0:2.6.0-1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-sshd@2.6.0-1.el8ev?arch=src" } } }, { "category": "product_version", "name": "ansible-runner-service-0:1.0.7-1.el8ev.src", "product": { "name": "ansible-runner-service-0:1.0.7-1.el8ev.src", "product_id": "ansible-runner-service-0:1.0.7-1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-runner-service@1.0.7-1.el8ev?arch=src" } } }, { "category": "product_version", "name": "ansible-runner-0:1.4.6-2.el8ar.src", "product": { "name": "ansible-runner-0:1.4.6-2.el8ar.src", "product_id": "ansible-runner-0:1.4.6-2.el8ar.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-runner@1.4.6-2.el8ar?arch=src" } } }, { "category": "product_version", "name": "ovirt-web-ui-0:1.6.7-1.el8ev.src", "product": { "name": "ovirt-web-ui-0:1.6.7-1.el8ev.src", "product_id": "ovirt-web-ui-0:1.6.7-1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-web-ui@1.6.7-1.el8ev?arch=src" } } }, { "category": "product_version", "name": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src", "product": { "name": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src", "product_id": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-dwh@4.4.5.5-1.el8ev?arch=src" } } }, { "category": "product_version", "name": "ovirt-engine-0:4.4.5.9-0.1.el8ev.src", "product": { "name": "ovirt-engine-0:4.4.5.9-0.1.el8ev.src", "product_id": "ovirt-engine-0:4.4.5.9-0.1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine@4.4.5.9-0.1.el8ev?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "apache-sshd-0:2.6.0-1.el8ev.noarch", "product": { "name": "apache-sshd-0:2.6.0-1.el8ev.noarch", "product_id": "apache-sshd-0:2.6.0-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-sshd@2.6.0-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch", "product": { "name": "apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch", "product_id": "apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-sshd-javadoc@2.6.0-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ansible-runner-service-0:1.0.7-1.el8ev.noarch", "product": { "name": "ansible-runner-service-0:1.0.7-1.el8ev.noarch", "product_id": "ansible-runner-service-0:1.0.7-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-runner-service@1.0.7-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ansible-runner-0:1.4.6-2.el8ar.noarch", "product": { "name": "ansible-runner-0:1.4.6-2.el8ar.noarch", "product_id": "ansible-runner-0:1.4.6-2.el8ar.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-runner@1.4.6-2.el8ar?arch=noarch" } } }, { "category": "product_version", "name": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch", "product": { "name": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch", "product_id": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ansible-runner@1.4.6-2.el8ar?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-web-ui-0:1.6.7-1.el8ev.noarch", "product": { "name": "ovirt-web-ui-0:1.6.7-1.el8ev.noarch", "product_id": "ovirt-web-ui-0:1.6.7-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-web-ui@1.6.7-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch", "product": { "name": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch", "product_id": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-dwh@4.4.5.5-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch", "product": { "name": "ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch", "product_id": "ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-dwh-grafana-integration-setup@4.4.5.5-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch", "product": { "name": "ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch", "product_id": "ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-dwh-setup@4.4.5.5-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch", "product_id": "ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine@4.4.5.9-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch", "product_id": "ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-backend@4.4.5.9-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch", "product_id": "ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-dbscripts@4.4.5.9-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch", "product_id": "ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-health-check-bundler@4.4.5.9-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch", "product_id": "ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-restapi@4.4.5.9-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch", "product_id": "ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-setup@4.4.5.9-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch", "product_id": "ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-setup-base@4.4.5.9-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch", "product_id": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-cinderlib@4.4.5.9-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch", "product_id": "ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-imageio@4.4.5.9-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch", "product_id": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-ovirt-engine@4.4.5.9-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch", "product_id": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-ovirt-engine-common@4.4.5.9-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch", "product_id": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-vmconsole-proxy-helper@4.4.5.9-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch", "product_id": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-websocket-proxy@4.4.5.9-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch", "product_id": "ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-tools@4.4.5.9-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch", "product_id": "ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-tools-backup@4.4.5.9-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch", "product_id": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-vmconsole-proxy-helper@4.4.5.9-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch", "product_id": "ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-webadmin-portal@4.4.5.9-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch", "product_id": "ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-websocket-proxy@4.4.5.9-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch", "product": { "name": "python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch", "product_id": "python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ovirt-engine-lib@4.4.5.9-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "rhvm-0:4.4.5.9-0.1.el8ev.noarch", "product": { "name": "rhvm-0:4.4.5.9-0.1.el8ev.noarch", "product_id": "rhvm-0:4.4.5.9-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhvm@4.4.5.9-0.1.el8ev?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ansible-runner-0:1.4.6-2.el8ar.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch" }, "product_reference": "ansible-runner-0:1.4.6-2.el8ar.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-runner-0:1.4.6-2.el8ar.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src" }, "product_reference": "ansible-runner-0:1.4.6-2.el8ar.src", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-runner-service-0:1.0.7-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch" }, "product_reference": "ansible-runner-service-0:1.0.7-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-runner-service-0:1.0.7-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src" }, "product_reference": "ansible-runner-service-0:1.0.7-1.el8ev.src", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "apache-sshd-0:2.6.0-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch" }, "product_reference": "apache-sshd-0:2.6.0-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "apache-sshd-0:2.6.0-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src" }, "product_reference": "apache-sshd-0:2.6.0-1.el8ev.src", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch" }, "product_reference": "apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-0:4.4.5.9-0.1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src" }, "product_reference": "ovirt-engine-0:4.4.5.9-0.1.el8ev.src", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch" }, "product_reference": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src" }, "product_reference": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch" }, "product_reference": "ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch" }, "product_reference": "ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-web-ui-0:1.6.7-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch" }, "product_reference": "ovirt-web-ui-0:1.6.7-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-web-ui-0:1.6.7-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src" }, "product_reference": "ovirt-web-ui-0:1.6.7-1.el8ev.src", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch" }, "product_reference": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch" }, "product_reference": "python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhvm-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch" }, "product_reference": "rhvm-0:4.4.5.9-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-20921", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-09-24T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src", "8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch", "8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src", "8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch", "8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src", "8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1882273" } ], "notes": [ { "category": "description", "text": "bootstrap-select before 1.13.6 allows Cross-Site Scripting (XSS). It does not escape title values in OPTION elements. This may allow attackers to execute arbitrary JavaScript in a victim\u0027s browser.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-bootstrap-select: not escaping title values on \u003coption\u003e may lead to XSS", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Service Mesh (OSSM) the openshift-service-mesh/kiali-rhel7 container (which installs the kiali rpm) is behind OpenShift OAuth authentication restricting access to the vulnerable bootstrap-select library to authenticated users only, therefore the impact is low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src" ], "known_not_affected": [ "8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src", "8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch", "8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src", "8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch", "8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src", "8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20921" }, { "category": "external", "summary": "RHBZ#1882273", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882273" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20921", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20921" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20921", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20921" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-9r7h-6639-v5mw", "url": "https://github.com/advisories/GHSA-9r7h-6639-v5mw" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-BOOTSTRAPSELECT-570457", "url": "https://snyk.io/vuln/SNYK-JS-BOOTSTRAPSELECT-570457" } ], "release_date": "2019-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-14T16:34:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1169" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-bootstrap-select: not escaping title values on \u003coption\u003e may lead to XSS" }, { "cve": "CVE-2020-25657", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "discovery_date": "2020-10-19T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src", "8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch", "8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src", "8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch", "8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src", "8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src", "8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889823" } ], "notes": [ { "category": "description", "text": "A flaw was found in all released versions of m2crypto, where they are vulnerable to Bleichenbacher timing attacks in the RSA decryption API via the timed processing of valid PKCS#1 v1.5 Ciphertext. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "m2crypto: bleichenbacher timing attacks in the RSA decryption API", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch" ], "known_not_affected": [ "8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src", "8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch", "8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src", "8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch", "8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src", "8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src", "8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25657" }, { "category": "external", "summary": "RHBZ#1889823", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889823" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25657", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25657" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25657", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25657" } ], "release_date": "2020-11-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-14T16:34:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1169" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "m2crypto: bleichenbacher timing attacks in the RSA decryption API" }, { "cve": "CVE-2020-28458", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-12-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src", "8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch", "8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src", "8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch", "8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src", "8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1908441" } ], "notes": [ { "category": "description", "text": "All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806.", "title": "Vulnerability description" }, { "category": "summary", "text": "datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift console container does package a vulnerable version of datatables.net, however as access to the vulnerable component is restricted via OpenShift OAuth the vulnerability is rated with an impact of `Low`.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src" ], "known_not_affected": [ "8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src", "8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch", "8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src", "8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch", "8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src", "8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28458" }, { "category": "external", "summary": "RHBZ#1908441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908441" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28458", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28458" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28458", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28458" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402", "url": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402" } ], "release_date": "2020-10-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-14T16:34:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1169" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name" }, { "cve": "CVE-2020-28477", "cwe": { "id": "CWE-915", "name": "Improperly Controlled Modification of Dynamically-Determined Object Attributes" }, "discovery_date": "2021-01-20T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src", "8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch", "8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src", "8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch", "8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src", "8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1918162" } ], "notes": [ { "category": "description", "text": "This affects all versions of package immer.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-immer: prototype pollution may lead to DoS or remote code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Virtualization includes affected version of nodejs-immer, however the usage does not meet the conditions required to exploit the flaw, therefore the impact is Low.\n\nIn OpenShift Container Platform 4.6 (OCP) the openshift4/ose-prometheus container ships the vulnerable version of the nodejs-immer, however the Prometheus react-ui is disabled, hence this flaw cannot be exploited. As openshift4/ose-prometheus container still packages the vulnerable code, this component is affected with impact Low. This may be fixed in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src" ], "known_not_affected": [ "8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src", "8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch", "8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src", "8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch", "8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src", "8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch", "8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28477" }, { "category": "external", "summary": "RHBZ#1918162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918162" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28477", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28477" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-IMMER-1019369", "url": "https://snyk.io/vuln/SNYK-JS-IMMER-1019369" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-14T16:34:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1169" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-immer: prototype pollution may lead to DoS or remote code execution" } ] }
rhsa-2021_1186
Vulnerability from csaf_redhat
Published
2021-04-14 16:34
Modified
2024-11-26 06:33
Summary
Red Hat Security Advisory: RHV Manager (ovirt-engine) 4.4.z [ovirt-4.4.5] 0-day security, bug fix, enhance
Notes
Topic
An update for org.ovirt.engine-root, ovirt-engine-ui-extensions, and ovirt-web-ui is now available for Red Hat Virtualization Engine 4.4.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The ovirt-engine package provides the manager for virtualization environments.
This manager enables admins to define hosts and networks, as well as to add
storage, create VMs and manage user permissions.
Bug Fix(es):
* Previously, saving user preferences in the Red Hat Virtualization Manager required the MANIPULATE_USERS permission level. As a result, user preferences were not saved on the server.
In this release, the required permission level for saving user preferences was changed to EDIT_PROFILE, which is the permission level assigned by default to all users. As a result, saving user preferences works as expected. (BZ#1920539)
A list of bugs fixed in this update is available in the Technical Notes
book:
https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes
Security Fix(es):
* nodejs-bootstrap-select: not escaping title values on <option> may lead to XSS (CVE-2019-20921)
* datatables.net: prototype pollution if 'constructor' were used in a data property name (CVE-2020-28458)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for org.ovirt.engine-root, ovirt-engine-ui-extensions, and ovirt-web-ui is now available for Red Hat Virtualization Engine 4.4.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The ovirt-engine package provides the manager for virtualization environments.\nThis manager enables admins to define hosts and networks, as well as to add\nstorage, create VMs and manage user permissions.\n\nBug Fix(es):\n* Previously, saving user preferences in the Red Hat Virtualization Manager required the MANIPULATE_USERS permission level. As a result, user preferences were not saved on the server.\nIn this release, the required permission level for saving user preferences was changed to EDIT_PROFILE, which is the permission level assigned by default to all users. As a result, saving user preferences works as expected. (BZ#1920539)\n\nA list of bugs fixed in this update is available in the Technical Notes\nbook:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes\n\nSecurity Fix(es):\n\n* nodejs-bootstrap-select: not escaping title values on \u003coption\u003e may lead to XSS (CVE-2019-20921)\n\n* datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name (CVE-2020-28458)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:1186", "url": "https://access.redhat.com/errata/RHSA-2021:1186" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes", "url": "https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes" }, { "category": "external", "summary": "1171924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171924" }, { "category": "external", "summary": "1750426", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1750426" }, { "category": "external", "summary": "1795457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1795457" }, { "category": "external", "summary": "1882273", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882273" }, { "category": "external", "summary": "1908441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908441" }, { "category": "external", "summary": "1920539", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920539" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1186.json" } ], "title": "Red Hat Security Advisory: RHV Manager (ovirt-engine) 4.4.z [ovirt-4.4.5] 0-day security, bug fix, enhance", "tracking": { "current_release_date": "2024-11-26T06:33:00+00:00", "generator": { "date": "2024-11-26T06:33:00+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:1186", "initial_release_date": "2021-04-14T16:34:35+00:00", "revision_history": [ { "date": "2021-04-14T16:34:35+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-04-14T16:34:35+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-26T06:33:00+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product": { "name": "RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhev_manager:4.4:el8" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src", "product": { "name": "ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src", "product_id": "ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-ui-extensions@1.2.5-1.el8ev?arch=src" } } }, { "category": "product_version", "name": "ovirt-web-ui-0:1.6.8-1.el8ev.src", "product": { "name": "ovirt-web-ui-0:1.6.8-1.el8ev.src", "product_id": "ovirt-web-ui-0:1.6.8-1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-web-ui@1.6.8-1.el8ev?arch=src" } } }, { "category": "product_version", "name": "ovirt-engine-0:4.4.5.11-0.1.el8ev.src", "product": { "name": "ovirt-engine-0:4.4.5.11-0.1.el8ev.src", "product_id": "ovirt-engine-0:4.4.5.11-0.1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine@4.4.5.11-0.1.el8ev?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch", "product": { "name": "ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch", "product_id": "ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-ui-extensions@1.2.5-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-web-ui-0:1.6.8-1.el8ev.noarch", "product": { "name": "ovirt-web-ui-0:1.6.8-1.el8ev.noarch", "product_id": "ovirt-web-ui-0:1.6.8-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-web-ui@1.6.8-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch", "product_id": "ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine@4.4.5.11-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch", "product_id": "ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-backend@4.4.5.11-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch", "product_id": "ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-dbscripts@4.4.5.11-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch", "product_id": "ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-health-check-bundler@4.4.5.11-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch", "product_id": "ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-restapi@4.4.5.11-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch", "product_id": "ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-setup@4.4.5.11-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch", "product_id": "ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-setup-base@4.4.5.11-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch", "product_id": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-cinderlib@4.4.5.11-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch", "product_id": "ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-imageio@4.4.5.11-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch", "product_id": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-ovirt-engine@4.4.5.11-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch", "product_id": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-ovirt-engine-common@4.4.5.11-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch", "product_id": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-vmconsole-proxy-helper@4.4.5.11-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch", "product_id": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-websocket-proxy@4.4.5.11-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch", "product_id": "ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-tools@4.4.5.11-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch", "product_id": "ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-tools-backup@4.4.5.11-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch", "product_id": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-vmconsole-proxy-helper@4.4.5.11-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch", "product_id": "ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-webadmin-portal@4.4.5.11-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch", "product_id": "ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-websocket-proxy@4.4.5.11-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch", "product": { "name": "python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch", "product_id": "python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ovirt-engine-lib@4.4.5.11-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "rhvm-0:4.4.5.11-0.1.el8ev.noarch", "product": { "name": "rhvm-0:4.4.5.11-0.1.el8ev.noarch", "product_id": "rhvm-0:4.4.5.11-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhvm@4.4.5.11-0.1.el8ev?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-0:4.4.5.11-0.1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.src" }, "product_reference": "ovirt-engine-0:4.4.5.11-0.1.el8ev.src", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch" }, "product_reference": "ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src" }, "product_reference": "ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-web-ui-0:1.6.8-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.noarch" }, "product_reference": "ovirt-web-ui-0:1.6.8-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-web-ui-0:1.6.8-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.src" }, "product_reference": "ovirt-web-ui-0:1.6.8-1.el8ev.src", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch" }, "product_reference": "python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhvm-0:4.4.5.11-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:rhvm-0:4.4.5.11-0.1.el8ev.noarch" }, "product_reference": "rhvm-0:4.4.5.11-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-20921", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-09-24T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.src", "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:rhvm-0:4.4.5.11-0.1.el8ev.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1882273" } ], "notes": [ { "category": "description", "text": "bootstrap-select before 1.13.6 allows Cross-Site Scripting (XSS). It does not escape title values in OPTION elements. This may allow attackers to execute arbitrary JavaScript in a victim\u0027s browser.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-bootstrap-select: not escaping title values on \u003coption\u003e may lead to XSS", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Service Mesh (OSSM) the openshift-service-mesh/kiali-rhel7 container (which installs the kiali rpm) is behind OpenShift OAuth authentication restricting access to the vulnerable bootstrap-select library to authenticated users only, therefore the impact is low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src" ], "known_not_affected": [ "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.src", "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:rhvm-0:4.4.5.11-0.1.el8ev.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20921" }, { "category": "external", "summary": "RHBZ#1882273", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882273" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20921", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20921" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20921", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20921" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-9r7h-6639-v5mw", "url": "https://github.com/advisories/GHSA-9r7h-6639-v5mw" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-BOOTSTRAPSELECT-570457", "url": "https://snyk.io/vuln/SNYK-JS-BOOTSTRAPSELECT-570457" } ], "release_date": "2019-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-14T16:34:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1186" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-bootstrap-select: not escaping title values on \u003coption\u003e may lead to XSS" }, { "cve": "CVE-2020-28458", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-12-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.src", "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:rhvm-0:4.4.5.11-0.1.el8ev.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1908441" } ], "notes": [ { "category": "description", "text": "All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806.", "title": "Vulnerability description" }, { "category": "summary", "text": "datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift console container does package a vulnerable version of datatables.net, however as access to the vulnerable component is restricted via OpenShift OAuth the vulnerability is rated with an impact of `Low`.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src" ], "known_not_affected": [ "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.11-0.1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.8-1.el8ev.src", "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.11-0.1.el8ev.noarch", "8Base-RHV-S-4.4:rhvm-0:4.4.5.11-0.1.el8ev.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28458" }, { "category": "external", "summary": "RHBZ#1908441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908441" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28458", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28458" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28458", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28458" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402", "url": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402" } ], "release_date": "2020-10-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-14T16:34:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1186" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.5-1.el8ev.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name" } ] }
gsd-2020-28458
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2020-28458", "description": "All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806.", "id": "GSD-2020-28458", "references": [ "https://access.redhat.com/errata/RHSA-2021:1186", "https://access.redhat.com/errata/RHSA-2021:1184", "https://access.redhat.com/errata/RHSA-2021:1169" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2020-28458" ], "details": "All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806.", "id": "GSD-2020-28458", "modified": "2023-12-13T01:22:01.618347Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "report@snyk.io", "DATE_PUBLIC": "2020-12-16T10:31:22.782637Z", "ID": "CVE-2020-28458", "STATE": "PUBLIC", "TITLE": "Prototype Pollution" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "datatables.net", "version": { "version_data": [ { "version_affected": "\u003e=", "version_value": "0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "credit": [ { "lang": "eng", "value": "Alessio Della Libera (d3lla)" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Prototype Pollution" } ] } ] }, "references": { "reference_data": [ { "name": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402", "refsource": "MISC", "url": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402" }, { "name": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1051961", "refsource": "MISC", "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1051961" }, { "name": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1051962", "refsource": "MISC", "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1051962" }, { "name": "https://github.com/DataTables/Dist-DataTables/blob/master/js/jquery.dataTables.js%23L2766", "refsource": "MISC", "url": "https://github.com/DataTables/Dist-DataTables/blob/master/js/jquery.dataTables.js%23L2766" }, { "name": "https://github.com/DataTables/DataTablesSrc/commit/a51cbe99fd3d02aa5582f97d4af1615d11a1ea03", "refsource": "MISC", "url": "https://github.com/DataTables/DataTablesSrc/commit/a51cbe99fd3d02aa5582f97d4af1615d11a1ea03" }, { "name": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806", "refsource": "MISC", "url": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003c1.10.22", "affected_versions": "All versions before 1.10.22", "cvss_v2": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "cwe_ids": [ "CWE-1035", "CWE-20", "CWE-937" ], "date": "2021-07-21", "description": "`datatables.net` is vulnerable to Prototype Pollution due to an incomplete fix", "fixed_versions": [ "1.10.22" ], "identifier": "CVE-2020-28458", "identifiers": [ "CVE-2020-28458" ], "not_impacted": "All versions starting from 1.10.22", "package_slug": "npm/datatables.net", "pubdate": "2020-12-16", "solution": "Upgrade to version 1.10.22 or above.", "title": "Improper Input Validation", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-28458" ], "uuid": "1e43cde1-ae0a-4dab-9880-8d06b903d386" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:datatables:datatables.net:*:*:*:*:*:node.js:*:*", "cpe_name": [], "versionEndExcluding": "1.10.23", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "report@snyk.io", "ID": "CVE-2020-28458" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-1321" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/DataTables/Dist-DataTables/blob/master/js/jquery.dataTables.js%23L2766", "refsource": "MISC", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "https://github.com/DataTables/Dist-DataTables/blob/master/js/jquery.dataTables.js%23L2766" }, { "name": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1051961", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1051961" }, { "name": "https://github.com/DataTables/DataTablesSrc/commit/a51cbe99fd3d02aa5582f97d4af1615d11a1ea03", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/DataTables/DataTablesSrc/commit/a51cbe99fd3d02aa5582f97d4af1615d11a1ea03" }, { "name": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402" }, { "name": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1051962", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1051962" }, { "name": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806", "refsource": "MISC", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4 } }, "lastModifiedDate": "2022-08-15T15:51Z", "publishedDate": "2020-12-16T11:15Z" } } }
ghsa-m7j4-fhg6-xf5v
Vulnerability from github
Published
2020-12-17 21:00
Modified
2024-06-21 21:33
Severity ?
Summary
datatables.net vulnerable to Prototype Pollution due to incomplete fix
Details
All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806.
{ "affected": [ { "package": { "ecosystem": "npm", "name": "datatables.net" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "1.10.22" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2020-28458" ], "database_specific": { "cwe_ids": [ "CWE-1321" ], "github_reviewed": true, "github_reviewed_at": "2020-12-17T18:27:07Z", "nvd_published_at": "2020-12-16T11:15:00Z", "severity": "HIGH" }, "details": "All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806.", "id": "GHSA-m7j4-fhg6-xf5v", "modified": "2024-06-21T21:33:49Z", "published": "2020-12-17T21:00:50Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28458" }, { "type": "WEB", "url": "https://github.com/DataTables/DataTablesSrc/commit/a51cbe99fd3d02aa5582f97d4af1615d11a1ea03" }, { "type": "PACKAGE", "url": "https://github.com/DataTables/DataTablesSrc" }, { "type": "WEB", "url": "https://github.com/DataTables/Dist-DataTables/blob/master/js/jquery.dataTables.js%23L2766" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20240621-0006" }, { "type": "WEB", "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1051961" }, { "type": "WEB", "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1051962" }, { "type": "WEB", "url": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402" }, { "type": "WEB", "url": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "type": "CVSS_V3" } ], "summary": "datatables.net vulnerable to Prototype Pollution due to incomplete fix" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.